Vulnerability Details : CVE-2023-25350
Faveo Helpdesk 1.0-1.11.1 is vulnerable to SQL Injection. When the user logs in through the login box, he has no judgment on the validity of the user's input data. The parameters passed from the front end to the back end are controllable, which will lead to SQL injection.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2023-25350
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 17 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2023-25350
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
[email protected] |
CWE ids for CVE-2023-25350
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: [email protected] (Primary)
References for CVE-2023-25350
-
https://github.com/ladybirdweb/faveo-helpdesk/issues/7827
Exploit;Issue Tracking;Third Party Advisory
-
https://gist.github.com/Whitehat-Su/8402323c00ea93b4abc21ab9a372101e
Third Party Advisory
Products affected by CVE-2023-25350
- cpe:2.3:a:ladybirdweb:faveo_helpdesk:*:*:*:*:*:*:*:*