{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1506","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-20T07:32:52.947Z","datePublished":"2023-03-20T09:31:04.091Z","dateUpdated":"2024-08-02T05:49:11.644Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-21T09:49:53.569Z"},"title":"SourceCodester E-Commerce System login.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"E-Commerce System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in SourceCodester E-Commerce System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument U_USERNAME leads to sql injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-223410 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester E-Commerce System 1.0 gefunden. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion der Datei login.php. Dank der Manipulation des Arguments U_USERNAME mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.6,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-03-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-20T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-20T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-12T06:44:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"WWesleywww (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.223410","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.223410","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:49:11.644Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.223410","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.223410","tags":["signature","x_transferred"]}]}]}}