Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32651 | Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 12 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2025-06-12T14:33:40.573Z
Reserved: 2023-03-30T09:34:25.188Z
Link: CVE-2023-29047
Updated: 2024-08-02T14:00:14.821Z
Status : Modified
Published: 2023-11-02T14:15:11.280
Modified: 2024-11-21T07:56:26.670
Link: CVE-2023-29047
No data.
OpenCVE Enrichment
No data.
EUVD