{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1475","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-17T14:41:48.144Z","datePublished":"2023-03-17T14:42:05.637Z","dateUpdated":"2024-08-02T05:49:11.594Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:58:19.530Z"},"title":"SourceCodester Canteen Management System createuser.php query sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Canteen Management System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, has been found in SourceCodester Canteen Management System 1.0. This issue affects the function query of the file createuser.php. The manipulation of the argument uemail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223337 was assigned to this vulnerability."},{"lang":"de","value":"Eine Schwachstelle wurde in SourceCodester Canteen Management System 1.0 entdeckt. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion query der Datei createuser.php. Durch Manipulation des Arguments uemail mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-03-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-17T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-17T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-11T14:31:23.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"faith (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.223337","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.223337","tags":["signature","permissions-required"]},{"url":"https://blog.csdn.net/weixin_43864034/article/details/129623847","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:49:11.594Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.223337","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.223337","tags":["signature","permissions-required","x_transferred"]},{"url":"https://blog.csdn.net/weixin_43864034/article/details/129623847","tags":["broken-link","exploit","x_transferred"]}]}]}}