{"api_version":"1","generated_at":"2026-04-25T21:12:50+00:00","cve":"CVE-2023-2473","urls":{"html":"https://cve.report/CVE-2023-2473","api":"https://cve.report/api/cve/CVE-2023-2473.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2473","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2473"},"summary":{"title":"CVE-2023-2473","description":"A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-05-02 13:15:00","updated_at":"2023-11-07 04:12:00"},"problem_types":["CWE-407"],"metrics":[],"references":[{"url":"https://gitee.com/isoftforce/dreamer_cms/issues/I6WHO7","name":"https://gitee.com/isoftforce/dreamer_cms/issues/I6WHO7","refsource":"MISC","tags":[],"title":"更改密码模块可能存在ddos攻击 · Issue #I6WHO7 · www.iteachyou.cc/Dreamer CMS（梦想家CMS内容管理系统） - Gitee.com","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?ctiid.227860","name":"https://vuldb.com/?ctiid.227860","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://vuldb.com/?id.227860","name":"https://vuldb.com/?id.227860","refsource":"MISC","tags":[],"title":"CVE-2023-2473: Dreamer CMS Password Hash Calculation UserController.java updatePwd algorithmic complexity (I6WHO7)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2473","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2473","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2473","vulnerable":"1","versionEndIncluding":"4.1.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dreamer_cms_project","cpe5":"dreamer_cms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2473","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860."},{"lang":"deu","value":"In Dreamer CMS bis 4.1.3 wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Es geht um die Funktion updatePwd der Datei UserController.java der Komponente Password Hash Calculation. Mittels Manipulieren mit unbekannten Daten kann eine inefficient algorithmic complexity-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-407 Inefficient Algorithmic Complexity","cweId":"CWE-407"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Dreamer CMS","version":{"version_data":[{"version_affected":"=","version_value":"4.1.0"},{"version_affected":"=","version_value":"4.1.1"},{"version_affected":"=","version_value":"4.1.2"},{"version_affected":"=","version_value":"4.1.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.227860","refsource":"MISC","name":"https://vuldb.com/?id.227860"},{"url":"https://vuldb.com/?ctiid.227860","refsource":"MISC","name":"https://vuldb.com/?ctiid.227860"},{"url":"https://gitee.com/isoftforce/dreamer_cms/issues/I6WHO7","refsource":"MISC","name":"https://gitee.com/isoftforce/dreamer_cms/issues/I6WHO7"}]},"credits":[{"lang":"en","value":"VulDB Gitee Analyzer"}],"impact":{"cvss":[{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}]}},"nvd":{"publishedDate":"2023-05-02 13:15:00","lastModifiedDate":"2023-11-07 04:12:00","problem_types":["CWE-407"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}