Show plain JSON{"id": "CVE-2022-4891", "metrics": {"cvssMetricV2": [{"type": "Secondary", "source": "cna@vuldb.com", "cvssData": {"version": "2.0", "baseScore": 2.7, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 5.1, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Secondary", "source": "cna@vuldb.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 3.5, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 2.1}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2023-01-17T20:15:11.757", "references": [{"url": "https://gist.githubusercontent.com/gmcabrita/e5dc0332473fc2e3a7a407434c8d21c7/raw/00b12035e5e1b685469f143b94301a50306376ba/example.html", "tags": ["Exploit", "Third Party Advisory"], "source": "cna@vuldb.com"}, {"url": "https://github.com/sisimai/rb-sisimai/commit/51fe2e6521c9c02b421b383943dc9e4bbbe65d4e", "tags": ["Patch", "Third Party Advisory"], "source": "cna@vuldb.com"}, {"url": "https://github.com/sisimai/rb-sisimai/pull/244", "tags": ["Exploit", "Patch", "Third Party Advisory"], "source": "cna@vuldb.com"}, {"url": "https://github.com/sisimai/rb-sisimai/releases/tag/v4.25.14p12", "tags": ["Release Notes", "Third Party Advisory"], "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?ctiid.218452", "tags": ["Permissions Required", "Third Party Advisory"], "source": "cna@vuldb.com"}, {"url": "https://vuldb.com/?id.218452", "tags": ["Permissions Required", "Third Party Advisory"], "source": "cna@vuldb.com"}, {"url": "https://gist.githubusercontent.com/gmcabrita/e5dc0332473fc2e3a7a407434c8d21c7/raw/00b12035e5e1b685469f143b94301a50306376ba/example.html", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/sisimai/rb-sisimai/commit/51fe2e6521c9c02b421b383943dc9e4bbbe65d4e", "tags": ["Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/sisimai/rb-sisimai/pull/244", "tags": ["Exploit", "Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/sisimai/rb-sisimai/releases/tag/v4.25.14p12", "tags": ["Release Notes", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?ctiid.218452", "tags": ["Permissions Required", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://vuldb.com/?id.218452", "tags": ["Permissions Required", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "cna@vuldb.com", "description": [{"lang": "en", "value": "CWE-1333"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been found in Sisimai up to 4.25.14p11 and classified as problematic. This vulnerability affects the function to_plain of the file lib/sisimai/string.rb. The manipulation leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. Upgrading to version 4.25.14p12 is able to address this issue. The name of the patch is 51fe2e6521c9c02b421b383943dc9e4bbbe65d4e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218452."}, {"lang": "es", "value": "Una vulnerabilidad ha sido encontrada en Sisimai hasta 4.25.14p11 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n to_plain del archivo lib/sisimai/string.rb. La manipulaci\u00f3n conduce a una complejidad de expresiones regulares ineficiente. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 4.25.14p12 puede solucionar este problema. El nombre del parche es 51fe2e6521c9c02b421b383943dc9e4bbbe65d4e. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-218452."}], "lastModified": "2024-11-21T07:36:09.260", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:libsisimai:sisimai:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3549E81-5B58-45A5-97C6-797FF262C0B1", "versionEndExcluding": "4.25.14"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "582141AF-FCED-4765-8EDE-8CF501DAC3E9"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "814D8C70-D100-4B73-8D86-1936C6263C10"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12924AEE-D957-497F-8EE5-AA7A74E24AEF"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45268EA6-08B9-48D2-BA7A-096E637BB1C9"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9391B85-E46E-4D6D-BE1A-1CE114ABF2C5"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "500E986E-4CD0-468C-9B31-D1BB94FC1DF7"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF93CF99-12ED-4E7D-A407-730CEFB6EB40"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFF9C919-8423-4F2B-B2B3-CD0CA33954A5"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54A66AD5-F4A4-47D1-8CAD-6501C753352A"}, {"criteria": "cpe:2.3:a:libsisimai:sisimai:4.25.14:p9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2C65642-EE72-45CD-8542-F2FC8825DAC7"}], "operator": "OR"}]}], "sourceIdentifier": "cna@vuldb.com"}