CVE-2023-2041

Source
https://cve.org/CVERecord?id=CVE-2023-2041
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2041.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-2041
Published
2023-04-14T09:15:07.540Z
Modified
2025-11-15T05:52:54.795720Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability classified as critical was found in novel-plus 3.6.2. Affected by this vulnerability is an unknown functionality of the file /category/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/201206030/novel-plus

Affected ranges

Type
GIT
Repo
https://github.com/201206030/novel-plus
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v1.*

v1.0.0
v1.1.0
v1.1.1

v2.*

v2.0.0
v2.0.2
v2.1.2
v2.5.0
v2.6.0
v2.8.0

v3.*

v3.0.2
v3.1.0
v3.3.0
v3.5.0
v3.5.1
v3.5.3
v3.5.4
v3.6.0
v3.6.1
v3.6.2

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2041.json"