|
1 | 1 | { |
2 | 2 | "dataType": "CVE_RECORD", |
3 | | - "dataVersion": "5.1", |
| 3 | + "dataVersion": "5.2", |
4 | 4 | "cveMetadata": { |
5 | 5 | "cveId": "CVE-2025-0974", |
6 | 6 | "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", |
7 | 7 | "state": "PUBLISHED", |
8 | 8 | "assignerShortName": "VulDB", |
9 | 9 | "dateReserved": "2025-02-02T09:03:03.907Z", |
10 | 10 | "datePublished": "2025-02-03T01:00:13.487Z", |
11 | | - "dateUpdated": "2025-02-12T20:41:37.430Z" |
| 11 | + "dateUpdated": "2026-04-19T13:24:22.430Z" |
12 | 12 | }, |
13 | 13 | "containers": { |
14 | 14 | "cna": { |
15 | 15 | "providerMetadata": { |
16 | 16 | "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", |
17 | 17 | "shortName": "VulDB", |
18 | | - "dateUpdated": "2025-02-03T01:00:13.487Z" |
| 18 | + "dateUpdated": "2026-04-19T13:24:22.430Z" |
19 | 19 | }, |
20 | 20 | "title": "MaxD Lightning Module deserialization", |
21 | 21 | "problemTypes": [ |
|
48 | 48 | { |
49 | 49 | "version": "4.43", |
50 | 50 | "status": "affected" |
| 51 | + }, |
| 52 | + { |
| 53 | + "version": "4.44", |
| 54 | + "status": "affected" |
| 55 | + }, |
| 56 | + { |
| 57 | + "version": "4.45", |
| 58 | + "status": "unaffected" |
51 | 59 | } |
52 | 60 | ] |
53 | 61 | } |
54 | 62 | ], |
55 | 63 | "descriptions": [ |
56 | 64 | { |
57 | 65 | "lang": "en", |
58 | | - "value": "A vulnerability, which was classified as critical, has been found in MaxD Lightning Module 4.43 on OpenCart. This issue affects some unknown processing. The manipulation of the argument li_op/md leads to deserialization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used." |
59 | | - }, |
60 | | - { |
61 | | - "lang": "de", |
62 | | - "value": "Eine Schwachstelle wurde in MaxD Lightning Module 4.43 für OpenCart entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code. Mittels dem Manipulieren des Arguments li_op/md mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung." |
| 66 | + "value": "A vulnerability was determined in MaxD Lightning Module 4.43/4.44 on OpenCart. This issue affects some unknown processing. Executing a manipulation of the argument li_op/md can lead to deserialization. The attack may be launched remotely. The attack requires a high level of complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. Upgrading to version 4.45 is capable of addressing this issue. Upgrading the affected component is advised." |
63 | 67 | } |
64 | 68 | ], |
65 | 69 | "metrics": [ |
66 | 70 | { |
67 | 71 | "cvssV4_0": { |
68 | 72 | "version": "4.0", |
69 | 73 | "baseScore": 2.3, |
70 | | - "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", |
| 74 | + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", |
71 | 75 | "baseSeverity": "LOW" |
72 | 76 | } |
73 | 77 | }, |
74 | 78 | { |
75 | 79 | "cvssV3_1": { |
76 | 80 | "version": "3.1", |
77 | 81 | "baseScore": 5, |
78 | | - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", |
| 82 | + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", |
79 | 83 | "baseSeverity": "MEDIUM" |
80 | 84 | } |
81 | 85 | }, |
82 | 86 | { |
83 | 87 | "cvssV3_0": { |
84 | 88 | "version": "3.0", |
85 | 89 | "baseScore": 5, |
86 | | - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", |
| 90 | + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", |
87 | 91 | "baseSeverity": "MEDIUM" |
88 | 92 | } |
89 | 93 | }, |
90 | 94 | { |
91 | 95 | "cvssV2_0": { |
92 | 96 | "version": "2.0", |
93 | 97 | "baseScore": 4.6, |
94 | | - "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P" |
| 98 | + "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" |
95 | 99 | } |
96 | 100 | } |
97 | 101 | ], |
|
107 | 111 | "value": "VulDB entry created" |
108 | 112 | }, |
109 | 113 | { |
110 | | - "time": "2025-02-02T10:09:12.000Z", |
| 114 | + "time": "2026-04-19T15:28:28.000Z", |
111 | 115 | "lang": "en", |
112 | 116 | "value": "VulDB entry last update" |
113 | 117 | } |
|
121 | 125 | ], |
122 | 126 | "references": [ |
123 | 127 | { |
124 | | - "url": "https://vuldb.com/?id.294365", |
| 128 | + "url": "https://vuldb.com/vuln/294365", |
125 | 129 | "name": "VDB-294365 | MaxD Lightning Module deserialization", |
126 | 130 | "tags": [ |
127 | 131 | "vdb-entry", |
128 | 132 | "technical-description" |
129 | 133 | ] |
130 | 134 | }, |
131 | 135 | { |
132 | | - "url": "https://vuldb.com/?ctiid.294365", |
| 136 | + "url": "https://vuldb.com/vuln/294365/cti", |
133 | 137 | "name": "VDB-294365 | CTI Indicators (IOB, IOC, IOA)", |
134 | 138 | "tags": [ |
135 | 139 | "signature", |
136 | 140 | "permissions-required" |
137 | 141 | ] |
138 | 142 | }, |
139 | 143 | { |
140 | | - "url": "https://vuldb.com/?submit.489672", |
| 144 | + "url": "https://vuldb.com/submit/489672", |
141 | 145 | "name": "Submit #489672 | devs.mx OpenCart Lightning 4.43 Deserialization of Untrusted Data", |
142 | 146 | "tags": [ |
143 | 147 | "third-party-advisory" |
|
148 | 152 | "tags": [ |
149 | 153 | "exploit" |
150 | 154 | ] |
| 155 | + }, |
| 156 | + { |
| 157 | + "url": "https://lightning.devs.mx/download", |
| 158 | + "tags": [ |
| 159 | + "patch" |
| 160 | + ] |
151 | 161 | } |
152 | 162 | ] |
153 | 163 | }, |
|
0 commit comments