Skip to main content

CVE-2023-36652: n/a in n/a

Medium
VulnerabilityCVE-2023-36652cvecve-2023-36652
Published: Tue Dec 12 2023 (12/12/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

A SQL Injection in the users searching REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to read database data via SQL commands injected in the search parameter.

AI-Powered Analysis

AILast updated: 07/06/2025, 04:25:57 UTC

Technical Analysis

CVE-2023-36652 is a medium-severity SQL Injection vulnerability identified in the users searching REST API endpoint of ProLion CryptoSpike version 3.0.15P2. This vulnerability allows remote authenticated attackers to inject arbitrary SQL commands through the search parameter, enabling unauthorized reading of database data. The flaw resides in improper sanitization or validation of user-supplied input within the search parameter, which is directly incorporated into SQL queries. Exploiting this vulnerability requires the attacker to have valid authentication credentials, but no user interaction beyond that is necessary. The vulnerability affects the confidentiality of the database contents, as attackers can extract sensitive information stored in the backend database. However, it does not impact data integrity or availability, as the injection is limited to read-only operations. The CVSS 3.1 base score is 4.3, reflecting the medium severity due to the need for authentication and the limited scope of impact. No known public exploits have been reported in the wild, and no patches or vendor advisories are currently available. The vulnerability is classified under CWE-89, which corresponds to SQL Injection issues.

Potential Impact

For European organizations using ProLion CryptoSpike 3.0.15P2, this vulnerability poses a risk to the confidentiality of sensitive user data stored within the application's database. Since the vulnerability requires authenticated access, the threat is primarily from insiders or attackers who have compromised legitimate credentials. The ability to read database contents could lead to exposure of personally identifiable information (PII), financial data, or other sensitive business information, potentially violating GDPR and other data protection regulations in Europe. This could result in regulatory penalties, reputational damage, and loss of customer trust. Although the vulnerability does not allow data modification or service disruption, the unauthorized data disclosure alone is significant, especially for organizations handling critical or regulated data. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in a financial or crypto-related product increases the attractiveness for targeted attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict access to the ProLion CryptoSpike application to trusted users and networks, enforcing strong authentication and monitoring for suspicious login activity. 2) Conduct immediate code review and input validation improvements on the users searching REST API endpoint to sanitize and parameterize SQL queries, eliminating injection vectors. 3) If possible, apply any vendor patches or updates once released; in the absence of patches, consider temporary compensating controls such as web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the search parameter. 4) Implement strict database access controls limiting the privileges of the application user account to read-only access on necessary tables only, reducing potential data exposure. 5) Monitor database query logs and application logs for anomalous queries or access patterns indicative of exploitation attempts. 6) Educate users on credential security to prevent unauthorized access that could lead to exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-06-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835d30c182aa0cae216c476

Added to database: 5/27/2025, 2:58:20 PM

Last enriched: 7/6/2025, 4:25:57 AM

Last updated: 8/8/2025, 3:13:29 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats