Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/53925?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53925?format=api", "vulnerability_id": "VCID-4b1q-fwjf-2ffs", "summary": "Duplicate Advisory GHSA-hrgx-p36p-89q4\n## Duplicate Advisory\n\nThis advisory is a duplicate of GHSA-hrgx-p36p-89q4. This link is maintained to preserve external references.\n\n## Original Description\n\nPrestaShop 1.6.0.10 through 1.7.x before 1.7.8.2 allows remote attackers to execute arbitrary code, aka a \"previously unknown vulnerability chain\" related to SQL injection, as exploited in the wild in July 2022.", "aliases": [ { "alias": "CVE-2022-36408" }, { "alias": "GHSA-qv6h-pcf2-2w3g" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/144232?format=api", "purl": "pkg:composer/prestashop/prestashop@1.6.0%2B10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4b1q-fwjf-2ffs" }, { "vulnerability": "VCID-vcuy-9cdj-uyhz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.6.0%252B10" } ], "references": [ { "reference_url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites" }, { "reference_url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/" }, { "reference_url": "https://github.com/PrestaShop/PrestaShop", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/PrestaShop/PrestaShop" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36408", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36408" }, { "reference_url": "https://github.com/advisories/GHSA-qv6h-pcf2-2w3g", "reference_id": "GHSA-qv6h-pcf2-2w3g", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-qv6h-pcf2-2w3g" } ], "weaknesses": [ { "cwe_id": 89, "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "description": "The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component." } ], "exploits": [], "severity_range_score": "9.0 - 10.0", "exploitability": "0.5", "weighted_severity": "9.0", "risk_score": 4.5, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4b1q-fwjf-2ffs" }