{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1062","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-27T11:07:09.235Z","datePublished":"2023-02-27T11:08:31.912Z","dateUpdated":"2024-08-02T05:32:46.350Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-21T07:10:02.847Z"},"title":"SourceCodester Doctors Appointment System Parameter add-new.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Doctors Appointment System","versions":[{"version":"1.0","status":"affected"}],"modules":["Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in SourceCodester Doctors Appointment System 1.0. Affected is an unknown function of the file /admin/add-new.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221826 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Doctors Appointment System 1.0 gefunden. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /admin/add-new.php der Komponente Parameter Handler. Dank der Manipulation des Arguments email mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-27T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-25T14:08:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"SSL_Seven_Security Lab_WangZhiQiang_ZhangYing (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.221826","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.221826","tags":["signature","permissions-required"]},{"url":"https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun5.pdf","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:32:46.350Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.221826","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.221826","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun5.pdf","tags":["exploit","x_transferred"]}]}]}}