CRITICALCVE-2023-6414CVSS 9.8

SQL injection in Voovi Social Networking Script

翻译中…

平台

php

组件

voovi-social-networking-script

修复版本

1.0.1

AI Confidence: highNVDEPSS 0.2%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2023-6414 describes a critical SQL injection vulnerability discovered in Voovi Social Networking Script versions 1.0. This flaw allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized data access and manipulation. The vulnerability resides in the perfil.php file, specifically within the id and user parameters. A patch, version 1.0.1, has been released to address this security concern.

影响与攻击场景翻译中…

The SQL injection vulnerability in Voovi Social Networking Script poses a significant risk to data confidentiality and integrity. An attacker could exploit this flaw to bypass authentication mechanisms and gain unauthorized access to the database. This could lead to the extraction of sensitive user data, including usernames, passwords, email addresses, and potentially other personally identifiable information (PII). Furthermore, an attacker might be able to modify or delete data within the database, disrupting the functionality of the social networking script and potentially causing data loss. The impact is amplified if the database contains sensitive financial or business information.

利用背景翻译中…

CVE-2023-6414 was publicly disclosed on 2023-11-30. While no active exploitation campaigns have been definitively confirmed, the critical severity and ease of exploitation (SQL injection) suggest a high probability of exploitation if left unpatched. No KEV listing is currently available. Public proof-of-concept exploits are likely to emerge given the vulnerability's nature.

哪些人处于风险中翻译中…

Websites and applications utilizing the Voovi Social Networking Script version 1.0 are at immediate risk. This includes small to medium-sized businesses, personal blogs, and any online platform that has integrated this script without proper security hardening. Shared hosting environments are particularly vulnerable, as a compromised script on one site could potentially impact other sites on the same server.

检测步骤翻译中…

• php: Examine perfil.php for unsanitized usage of the id and user parameters in SQL queries. Look for string concatenation or direct insertion of user-supplied data into SQL statements.

// Example of vulnerable code
$sql = "SELECT * FROM users WHERE id = " . $_GET['id'];

• generic web: Monitor access logs for unusual SQL query patterns or error messages related to database connections. Look for requests to perfil.php with suspicious parameters.

grep -i "error: syntax" /var/log/apache2/error.log

• generic web: Use a web vulnerability scanner to automatically identify SQL injection vulnerabilities in the application. Configure the scanner to specifically target the perfil.php file.

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.20% (42% 百分位)

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件voovi-social-networking-script
供应商Voovi Social Networking Script
影响范围修复版本
1.0 – 1.01.0.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2023-6414 is to immediately upgrade Voovi Social Networking Script to version 1.0.1 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as input validation and sanitization on the id and user parameters in perfil.php. Web application firewalls (WAFs) configured with rules to detect and block SQL injection attempts can also provide an additional layer of protection. Regularly review and update database access permissions to limit the potential impact of a successful attack.

修复方法翻译中…

Actualizar a una versión parcheada o descontinuar el uso del script. Debido a la inyección SQL, es crucial revisar y limpiar las entradas de usuario en perfil.php, especialmente los parámetros 'id' y 'user', utilizando funciones de escape o consultas parametrizadas para prevenir la ejecución de código SQL malicioso.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2023-6414 — SQL Injection in Voovi Social Networking Script?

CVE-2023-6414 is a critical SQL injection vulnerability affecting Voovi Social Networking Script versions 1.0, allowing attackers to inject malicious SQL queries and potentially extract sensitive data.

Am I affected by CVE-2023-6414 in Voovi Social Networking Script?

If you are using Voovi Social Networking Script version 1.0, you are vulnerable. Upgrade to version 1.0.1 or later to mitigate the risk.

How do I fix CVE-2023-6414 in Voovi Social Networking Script?

The recommended fix is to upgrade to version 1.0.1 or later. As a temporary workaround, implement input validation and sanitization on the id and user parameters in perfil.php.

Is CVE-2023-6414 being actively exploited?

While no confirmed active exploitation campaigns are currently known, the vulnerability's critical severity and ease of exploitation suggest a high probability of exploitation if left unpatched.

Where can I find the official Voovi advisory for CVE-2023-6414?

Refer to the vendor's official advisory for the most up-to-date information and instructions: [https://github.com/voovi/voovi/issues/10](https://github.com/voovi/voovi/issues/10)

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。