{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0686","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-06T18:48:46.088Z","datePublished":"2023-02-06T18:50:20.362Z","dateUpdated":"2024-11-25T15:38:23.464Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T20:49:34.225Z"},"title":"SourceCodester Online Eyewear Shop HTTP POST Request update_cart sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Online Eyewear Shop","versions":[{"version":"1.0","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The identifier VDB-220245 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Online Eyewear Shop 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Es betrifft die Funktion update_cart der Datei /oews/classes/Master.php?f=update_cart der Komponente HTTP POST Request Handler. Durch die Manipulation des Arguments cart_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.6,"vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-06T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-05T12:56:07.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Pierfrancesco Conti","type":"finder"},{"lang":"en","value":"pcontiCP (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.220245","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.220245","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:17:50.351Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.220245","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.220245","tags":["signature","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-25T15:38:05.989381Z","id":"CVE-2023-0686","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-25T15:38:23.464Z"}}]}}