Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-6950", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "state": "PUBLISHED", "assignerShortName": "VulDB", "dateReserved": "2024-07-20T10:20:15.432Z", "datePublished": "2024-07-21T10:31:03.629Z", "dateUpdated": "2024-08-01T21:45:38.358Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB", "dateUpdated": "2024-07-21T10:31:03.629Z"}, "title": "Prain HTTP POST Request ?import code injection", "problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-94", "lang": "en", "description": "CWE-94 Code Injection"}]}], "affected": [{"vendor": "n/a", "product": "Prain", "versions": [{"version": "1.0", "status": "affected"}, {"version": "1.1", "status": "affected"}, {"version": "1.2", "status": "affected"}, {"version": "1.3", "status": "affected"}], "modules": ["HTTP POST Request Handler"]}], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Prain up to 1.3.0. Affected by this issue is some unknown functionality of the file /?import of the component HTTP POST Request Handler. The manipulation of the argument file leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272072."}, {"lang": "de", "value": "Eine kritische Schwachstelle wurde in Prain bis 1.3.0 entdeckt. Dies betrifft einen unbekannten Teil der Datei /?import der Komponente HTTP POST Request Handler. Durch das Beeinflussen des Arguments file mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."}], "metrics": [{"cvssV4_0": {"version": "4.0", "baseScore": 5.3, "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "baseSeverity": "MEDIUM"}}, {"cvssV3_1": {"version": "3.1", "baseScore": 6.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseSeverity": "MEDIUM"}}, {"cvssV3_0": {"version": "3.0", "baseScore": 6.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseSeverity": "MEDIUM"}}, {"cvssV2_0": {"version": "2.0", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "timeline": [{"time": "2024-07-20T00:00:00.000Z", "lang": "en", "value": "Advisory disclosed"}, {"time": "2024-07-20T02:00:00.000Z", "lang": "en", "value": "VulDB entry created"}, {"time": "2024-07-20T12:26:07.000Z", "lang": "en", "value": "VulDB entry last update"}], "credits": [{"lang": "en", "value": "J1rrY (VulDB User)", "type": "reporter"}], "references": [{"url": "https://vuldb.com/?id.272072", "name": "VDB-272072 | Prain HTTP POST Request ?import code injection", "tags": ["vdb-entry", "technical-description"]}, {"url": "https://vuldb.com/?ctiid.272072", "name": "VDB-272072 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": ["signature", "permissions-required"]}, {"url": "https://vuldb.com/?submit.375244", "name": "Submit #375244 | https://prain.cn/ Prain Open source PHP light blog program <=1.3.0 arbitrary file writes", "tags": ["third-party-advisory"]}, {"url": "https://gist.github.com/J1rrY-learn/c5818d700476c4debcf8a334a5c9c243", "tags": ["broken-link", "exploit"]}]}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-07-22T11:48:32.954041Z", "id": "CVE-2024-6950", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-07-22T11:48:54.472Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T21:45:38.358Z"}, "title": "CVE Program Container", "references": [{"url": "https://vuldb.com/?id.272072", "name": "VDB-272072 | Prain HTTP POST Request ?import code injection", "tags": ["vdb-entry", "technical-description", "x_transferred"]}, {"url": "https://vuldb.com/?ctiid.272072", "name": "VDB-272072 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": ["signature", "permissions-required", "x_transferred"]}, {"url": "https://vuldb.com/?submit.375244", "name": "Submit #375244 | https://prain.cn/ Prain Open source PHP light blog program <=1.3.0 arbitrary file writes", "tags": ["third-party-advisory", "x_transferred"]}, {"url": "https://gist.github.com/J1rrY-learn/c5818d700476c4debcf8a334a5c9c243", "tags": ["broken-link", "exploit", "x_transferred"]}]}]}}