{"api_version":"1","generated_at":"2026-04-22T23:31:31+00:00","cve":"CVE-2023-30575","urls":{"html":"https://cve.report/CVE-2023-30575","api":"https://cve.report/api/cve/CVE-2023-30575.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-30575","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-30575"},"summary":{"title":"CVE-2023-30575","description":"Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-06-07 09:15:00","updated_at":"2023-06-15 08:15:00"},"problem_types":["CWE-131"],"metrics":[],"references":[{"url":"https://lists.apache.org/thread/tn63n2lon0h5p45oft834t1dqvvxownv","name":"https://lists.apache.org/thread/tn63n2lon0h5p45oft834t1dqvvxownv","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-30575","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30575","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"30575","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"guacamole","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-30575","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-131 Incorrect Calculation of Buffer Size","cweId":"CWE-131"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache Guacamole","version":{"version_data":[{"version_affected":"<=","version_name":"0","version_value":"1.5.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://lists.apache.org/thread/tn63n2lon0h5p45oft834t1dqvvxownv","refsource":"MISC","name":"https://lists.apache.org/thread/tn63n2lon0h5p45oft834t1dqvvxownv"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Stefan Schiller (Sonar)"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-07 09:15:00","lastModifiedDate":"2023-06-15 08:15:00","problem_types":["CWE-131"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:guacamole:*:*:*:*:*:*:*:*","versionEndExcluding":"1.5.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}