{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0784","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-12T07:28:08.800Z","datePublished":"2023-02-12T07:29:22.816Z","dateUpdated":"2024-08-02T05:24:33.883Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T21:00:32.982Z"},"title":"SourceCodester Best Online News Portal Login Page sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Best Online News Portal","versions":[{"version":"1.0","status":"affected"}],"modules":["Login Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. Affected is an unknown function of the component Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220644."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in SourceCodester Best Online News Portal 1.0 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Komponente Login Page. Mittels Manipulieren des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-12T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-12T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-10T09:35:50.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Gab3 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.220644","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.220644","tags":["signature","permissions-required"]},{"url":"https://youtu.be/V62MSWhLGL4","tags":["media-coverage"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:24:33.883Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.220644","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.220644","tags":["signature","permissions-required","x_transferred"]},{"url":"https://youtu.be/V62MSWhLGL4","tags":["media-coverage","x_transferred"]}]}]}}