Description
An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.
Published: 2024-02-02
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-52695 An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.
History

Fri, 30 May 2025 16:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-03T02:13:52.483Z

Reserved: 2023-11-17T00:00:00.000Z

Link: CVE-2023-48645

cve-icon Vulnrichment

Updated: 2024-08-02T21:37:54.447Z

cve-icon NVD

Status : Modified

Published: 2024-02-02T09:15:37.420

Modified: 2025-06-03T03:15:24.817

Link: CVE-2023-48645

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses