Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/53925?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53925?format=api",
    "vulnerability_id": "VCID-4b1q-fwjf-2ffs",
    "summary": "Duplicate Advisory GHSA-hrgx-p36p-89q4\n## Duplicate Advisory\n\nThis advisory is a duplicate of GHSA-hrgx-p36p-89q4. This link is maintained to preserve external references.\n\n## Original Description\n\nPrestaShop 1.6.0.10 through 1.7.x before 1.7.8.2 allows remote attackers to execute arbitrary code, aka a \"previously unknown vulnerability chain\" related to SQL injection, as exploited in the wild in July 2022.",
    "aliases": [
        {
            "alias": "CVE-2022-36408"
        },
        {
            "alias": "GHSA-qv6h-pcf2-2w3g"
        }
    ],
    "fixed_packages": [],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/144232?format=api",
            "purl": "pkg:composer/prestashop/prestashop@1.6.0%2B10",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-4b1q-fwjf-2ffs"
                },
                {
                    "vulnerability": "VCID-vcuy-9cdj-uyhz"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.6.0%252B10"
        }
    ],
    "references": [
        {
            "reference_url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "9.8",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "CRITICAL",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites"
        },
        {
            "reference_url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/"
        },
        {
            "reference_url": "https://github.com/PrestaShop/PrestaShop",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "9.8",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "CRITICAL",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/PrestaShop/PrestaShop"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36408",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "9.8",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "value": "CRITICAL",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36408"
        },
        {
            "reference_url": "https://github.com/advisories/GHSA-qv6h-pcf2-2w3g",
            "reference_id": "GHSA-qv6h-pcf2-2w3g",
            "reference_type": "",
            "scores": [
                {
                    "value": "CRITICAL",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/advisories/GHSA-qv6h-pcf2-2w3g"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 89,
            "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
            "description": "The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component."
        }
    ],
    "exploits": [],
    "severity_range_score": "9.0 - 10.0",
    "exploitability": "0.5",
    "weighted_severity": "9.0",
    "risk_score": 4.5,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4b1q-fwjf-2ffs"
}