{ "schema_version": "1.4.0", "id": "GHSA-xxf8-fpmr-fw7v", "modified": "2024-06-18T16:34:05Z", "published": "2024-02-27T18:31:01Z", "withdrawn": "2024-06-18T16:34:05Z", "aliases": [ "CVE-2024-25400" ], "summary": "Withdrawn Advisory: Subrion CMS vulnerable to SQL Injection", "details": "## Withdrawn Advisory\n\nThis advisory has been withdrawn because it was determined to not be a vulnerability. Please see the issue [here](https://github.com/intelliants/subrion/issues/910#issuecomment-2174012538) for more information.\n\n## Original Description\n\nSubrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php.", "severity": [], "affected": [ { "package": { "ecosystem": "Packagist", "name": "intelliants/subrion" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "4.2.1" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25400" }, { "type": "WEB", "url": "https://github.com/intelliants/subrion/issues/910" }, { "type": "WEB", "url": "https://cwe.mitre.org/data/definitions/89.html" }, { "type": "PACKAGE", "url": "https://github.com/intelliants/subrion" }, { "type": "WEB", "url": "https://subrion.org" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-02-27T21:48:32Z", "nvd_published_at": "2024-02-27T16:15:46Z" } }