Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-02T14:00:14.821Z
Reserved: 2023-03-30T09:34:25.188Z
Link: CVE-2023-29047

No data.

Status : Modified
Published: 2023-11-02T14:15:11.280
Modified: 2024-11-21T07:56:26.670
Link: CVE-2023-29047

No data.