{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1908","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-04-06T12:12:20.099Z","datePublished":"2023-04-06T12:31:03.499Z","dateUpdated":"2024-08-02T06:05:26.780Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-22T06:23:20.612Z"},"title":"SourceCodester Simple Mobile Comparison Website GET Parameter view_category.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Simple Mobile Comparison Website","versions":[{"version":"1.0","status":"affected"}],"modules":["GET Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Simple Mobile Comparison Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/categories/view_category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225150 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in SourceCodester Simple Mobile Comparison Website 1.0 ausgemacht. Es betrifft eine unbekannte Funktion der Datei /admin/categories/view_category.php der Komponente GET Parameter Handler. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-04-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-04-06T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-04-06T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-23T15:12:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Zhang RuiMing (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.225150","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.225150","tags":["signature","permissions-required"]},{"url":"https://github.com/Kerkong/bug_report/blob/main/SQLi-1.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:05:26.780Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.225150","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.225150","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/Kerkong/bug_report/blob/main/SQLi-1.md","tags":["exploit","x_transferred"]}]}]}}