{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1276","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-08T17:59:59.897Z","datePublished":"2023-03-08T18:00:40.000Z","dateUpdated":"2024-08-02T05:40:59.821Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:50:27.728Z"},"title":"SUL1SS_shop Order.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"SUL1SS_shop","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, has been found in SUL1SS_shop. This issue affects some unknown processing of the file application\\merch\\controller\\Order.php. The manipulation of the argument keyword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222599."},{"lang":"de","value":"Eine Schwachstelle wurde in SUL1SS_shop entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei application\\merch\\controller\\Order.php. Durch die Manipulation des Arguments keyword mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-03-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-08T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-01T19:48:23.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nokali (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.222599","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.222599","tags":["signature","permissions-required"]},{"url":"https://tib36.github.io/2023/03/04/SUL1SS-shop-SQLi/","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:40:59.821Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.222599","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.222599","tags":["signature","permissions-required","x_transferred"]},{"url":"https://tib36.github.io/2023/03/04/SUL1SS-shop-SQLi/","tags":["broken-link","exploit","x_transferred"]}]}]}}