{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1366","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-13T07:21:09.634Z","datePublished":"2023-03-13T08:31:02.999Z","dateUpdated":"2024-08-02T05:49:10.252Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-21T08:24:28.896Z"},"title":"SourceCodester Yoga Class Registration System manage_category.php query sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Yoga Class Registration System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been classified as critical. This affects the function query of the file admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222873 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Yoga Class Registration System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion query der Datei admin/categories/manage_category.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-03-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-13T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-13T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-04T15:23:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"bit3hh (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.222873","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.222873","tags":["signature","permissions-required"]},{"url":"https://blog.csdn.net/Dwayne_Wade/article/details/129493110","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:49:10.252Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.222873","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.222873","tags":["signature","permissions-required","x_transferred"]},{"url":"https://blog.csdn.net/Dwayne_Wade/article/details/129493110","tags":["exploit","x_transferred"]}]}]}}