We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | VulDB |
Reserved | 2024-07-03 |
Published | 2024-07-03 |
Updated | 2024-08-01 |
A vulnerability was found in playSMS 1.4.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php?app=main&inc=feature_inboxgroup&op=list of the component Template Handler. The manipulation of the argument Receiver Number with the input {{`id`}} leads to injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-270278 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Eine problematische Schwachstelle wurde in playSMS 1.4.3 ausgemacht. Betroffen davon ist ein unbekannter Prozess der Datei /index.php?app=main&inc=feature_inboxgroup&op=list der Komponente Template Handler. Durch Manipulieren des Arguments Receiver Number mit der Eingabe {{`id`}} mit unbekannten Daten kann eine injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N | |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N | |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N | |
CVSS:2.0/AV:N/AC:L/Au:M/C:N/I:P/A:N |
2024-07-03: | Advisory disclosed |
2024-07-03: | VulDB entry created |
2024-07-03: | VulDB entry last update |
Dhimitri (VulDB User)
https://vuldb.com/?id.270278 (VDB-270278 | playSMS Template injection)
https://vuldb.com/?ctiid.270278 (VDB-270278 | CTI Indicators (IOB, IOC, TTP, IOA))
https://vuldb.com/?submit.363733 (Submit #363733 | playSMS 1.4.3 Server Side Template Injection (SSTI))