CRITICALCVE-2023-6412CVSS 9.8

SQL injection in Voovi Social Networking Script

traduction en cours…

Plateforme

php

Composant

voovi-social-networking-script

Corrigé dans

1.0.1

AI Confidence: highNVDEPSS 0.2%Révisé: mai 2026
Traduction vers votre langue…

CVE-2023-6412 represents a critical SQL injection vulnerability discovered in Voovi Social Networking Script versions 1.0 and 1.0. This flaw allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized data access and manipulation. A patch, version 1.0.1, has been released to address this security concern.

Impact et Scénarios d'Attaquetraduction en cours…

The SQL injection vulnerability in Voovi Social Networking Script allows an attacker to directly interact with the underlying database. By crafting malicious SQL queries through the photo.php parameter, an attacker can bypass security measures and execute arbitrary commands. This could result in the complete exfiltration of sensitive data, including user credentials, personal information, and potentially even database schema details. Successful exploitation could also lead to data modification or deletion, disrupting the functionality of the social networking script and compromising its integrity. The blast radius extends to all users of the affected script, particularly those storing sensitive information within the database.

Contexte d'Exploitationtraduction en cours…

CVE-2023-6412 was publicly disclosed on 2023-11-30. While no active exploitation campaigns have been definitively confirmed, the CRITICAL CVSS score and the ease of exploitation via SQL injection suggest a high probability of exploitation if the vulnerability remains unpatched. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are likely to emerge given the simplicity of the attack vector.

Qui Est à Risquetraduction en cours…

Websites and applications utilizing the Voovi Social Networking Script version 1.0 and 1.0 are at significant risk. This includes small to medium-sized businesses, personal blogs, and any platform integrating this script for social networking functionality. Shared hosting environments are particularly vulnerable, as a compromised script on one site could potentially impact others on the same server.

Étapes de Détectiontraduction en cours…

• php: Examine access logs for requests to photo.php containing unusual characters or SQL keywords (e.g., UNION, SELECT, DROP). • php: Search for modifications to the photo.php file that might indicate an attacker attempting to inject malicious code. • generic web: Use curl to test the photo.php endpoint with various SQL injection payloads to identify exploitable parameters.

curl 'http://example.com/voovi/photo.php?id=1 UNION SELECT 1,2,3 -- ' 

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

0.20% (percentile 42%)

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityHighRisque de modification non autorisée de donnéesAvailabilityHighRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
Availability
Élevé — panne complète ou épuisement des ressources. Déni de service total.

Logiciel Affecté

Composantvoovi-social-networking-script
FournisseurVoovi Social Networking Script
Plage affectéeCorrigé dans
1.0 – 1.01.0.1

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2023-6412 is to immediately upgrade to version 1.0.1 of Voovi Social Networking Script. If upgrading is not immediately feasible due to compatibility issues or downtime concerns, consider implementing a Web Application Firewall (WAF) with rules to filter potentially malicious SQL queries targeting the photo.php parameter. Input validation and sanitization on the server-side are also crucial to prevent SQL injection attacks. Regularly review and update database access permissions to limit the potential impact of a successful attack.

Comment corrigertraduction en cours…

Actualizar a una versión parcheada o descontinuar el uso del script. Debido a la vulnerabilidad de inyección SQL, es crucial aplicar las actualizaciones de seguridad proporcionadas por el proveedor o migrar a una solución más segura. En caso de no haber actualizaciones, se recomienda dejar de utilizar el software.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2023-6412 — SQL Injection in Voovi Social Networking Script?

CVE-2023-6412 is a critical SQL injection vulnerability affecting Voovi Social Networking Script versions 1.0 and 1.0, allowing attackers to inject malicious SQL queries via the photo.php parameter.

Am I affected by CVE-2023-6412 in Voovi Social Networking Script?

If you are using Voovi Social Networking Script version 1.0 or 1.0, you are potentially affected and should upgrade immediately.

How do I fix CVE-2023-6412 in Voovi Social Networking Script?

Upgrade to version 1.0.1 of Voovi Social Networking Script. As a temporary workaround, implement a WAF to filter malicious SQL queries.

Is CVE-2023-6412 being actively exploited?

While no confirmed active exploitation campaigns are currently known, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation if unpatched.

Where can I find the official Voovi advisory for CVE-2023-6412?

Refer to the vendor's website or security advisories for the latest information and updates regarding CVE-2023-6412.

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.