CVE-2023-47438: SQL Injection vulnerability in Reportico Till
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.26762%
CWE
Published
3/28/2024
Updated
11/18/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| reportico-web/reportico | composer | <= 8.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests through the 'project' parameter manipulation leading to SQL errors. This indicates: 1) Direct interpolation of user input in SQL queries 2) Lack of prepared statements/parameterization 3) Error messages revealing database structure. The most logical location would be in project loading logic where the 'project' parameter is used to query project configurations from the database. The high confidence comes from the clear attack pattern (parameter tampering causing SQL errors) and the CWE-89 classification.