{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0673","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-04T07:29:04.568Z","datePublished":"2023-02-04T07:29:30.815Z","dateUpdated":"2024-08-02T05:17:50.339Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T20:44:41.477Z"},"title":"SourceCodester Online Eyewear Shop sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Online Eyewear Shop","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The associated identifier of this vulnerability is VDB-220195."},{"lang":"de","value":"In SourceCodester Online Eyewear Shop 1.0 wurde eine kritische Schwachstelle entdeckt. Es geht um eine nicht näher bekannte Funktion der Datei oews/?p=products/view_product.php. Durch Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.6,"vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-04T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-04T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-05T07:51:15.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Pierfrancesco Conti","type":"finder"},{"lang":"en","value":"secpconti (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.220195","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.220195","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:17:50.339Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.220195","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.220195","tags":["signature","x_transferred"]}]}]}}