{"id":"CVE-2023-1610","details":"A vulnerability, which was classified as critical, has been found in Rebuild up to 3.2.3. Affected by this issue is some unknown functionality of the file /project/tasks/list. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223742 is the identifier assigned to this vulnerability.","modified":"2026-04-12T06:36:41.397318Z","published":"2023-03-23T20:15:14.850Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?ctiid.223742"},{"type":"ADVISORY","url":"https://vuldb.com/?id.223742"},{"type":"REPORT","url":"https://github.com/getrebuild/rebuild/issues/597"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/getrebuild/rebuild","events":[{"introduced":"0"},{"last_affected":"adc3adc64661ff9a5f4c775ef8dbb7bab15ceaf0"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"3.2.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:ruifang-tech:rebuild:*:*:*:*:*:*:*:*"}}],"versions":["1.0.0-beta","1.1.0-beta","1.10.0","1.10.1","1.10.2","1.10.3","1.11.0","1.11.1","1.11.2","1.2.0-beta","1.3.0-beta","1.4.0-beta","1.5.0-beta","1.5.1-release","1.6.0","1.6.0-beta","1.6.1-release","1.7.0","1.7.1","1.7.2","1.8.0","1.9.0","1.9.1","1.9.2","2.0.0","2.0.0-beta2","2.0.1","2.1.0","2.1.0-beta1","2.1.1","2.2.0","2.2.0-beta1","2.2.2","2.2.3","2.3.0","2.3.1","2.3.2","2.4.0","2.4.1","2.5.0","2.5.0-beta1","2.5.0-beta2","2.5.1","2.6.0","2.6.0-beta1","2.6.1","2.6.2","2.7.0","2.7.1","2.7.2","2.7.3","2.8.0","2.8.1","2.8.2","2.8.3","2.8.4","2.9.0","2.9.1","2.9.2","2.9.3","2.9.4","2.9.5","2.9.6","3.0.0","3.0.1","3.0.2","3.0.3","3.1.0","3.1.1","3.1.2","3.1.3","3.1.4","3.2.0","3.2.1","3.2.2","3.2.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-1610.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}