{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1293","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-09T14:29:53.186Z","datePublished":"2023-03-09T14:30:29.708Z","dateUpdated":"2024-08-02T05:40:59.857Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:47:45.789Z"},"title":"SourceCodester Online Graduate Tracer System admin_cs.php mysqli_query sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Online Graduate Tracer System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects the function mysqli_query of the file admin_cs.php. The manipulation leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222647."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in SourceCodester Online Graduate Tracer System 1.0 gefunden. Dies betrifft die Funktion mysqli_query der Datei admin_cs.php. Durch das Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.6,"vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-03-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-09T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-09T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-02T09:09:33.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"bit3hh (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.222647","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.222647","tags":["signature","permissions-required"]},{"url":"https://blog.csdn.net/weixin_43864034/article/details/129418770","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:40:59.857Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.222647","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.222647","tags":["signature","permissions-required","x_transferred"]},{"url":"https://blog.csdn.net/weixin_43864034/article/details/129418770","tags":["broken-link","exploit","x_transferred"]}]}]}}