{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2016-15031","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-04T19:17:30.397Z","datePublished":"2023-05-06T00:31:03.699Z","dateUpdated":"2024-08-06T03:47:35.031Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T11:24:05.156Z"},"title":"PHP-Login POST Parameter class.loginscript.php checkLogin sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"PHP-Login","versions":[{"version":"1.0","status":"affected"}],"modules":["POST Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is identified as 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability."},{"lang":"de","value":"In PHP-Login 1.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion checkLogin der Datei login/scripts/class.loginscript.php der Komponente POST Parameter Handler. Durch die Manipulation des Arguments myusername mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Ein Aktualisieren auf die Version 2.0 vermag dieses Problem zu lösen. Der Patch wird als 0083ec652786ddbb81335ea20da590df40035679 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2016-01-10T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-04T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-05-27T16:54:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.228022","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.228022","tags":["signature","permissions-required"]},{"url":"https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679","tags":["patch"]},{"url":"https://github.com/ipoelnet/php-login/releases/tag/v2.0","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T03:47:35.031Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.228022","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.228022","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679","tags":["patch","x_transferred"]},{"url":"https://github.com/ipoelnet/php-login/releases/tag/v2.0","tags":["patch","x_transferred"]}]}]}}