{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2369","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-04-28T11:08:22.417Z","datePublished":"2023-04-28T13:00:04.508Z","dateUpdated":"2024-08-02T06:19:14.824Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-22T18:25:45.696Z"},"title":"SourceCodester Faculty Evaluation System manage_restriction.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Faculty Evaluation System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/manage_restriction.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227645 was assigned to this vulnerability."},{"lang":"de","value":"Eine Schwachstelle wurde in SourceCodester Faculty Evaluation System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei admin/manage_restriction.php. Dank der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-04-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-04-28T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-04-28T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-05-21T14:42:53.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"f0llow (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.227645","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.227645","tags":["signature","permissions-required"]},{"url":"https://github.com/f0llow/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-3.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"faculty_evaluation_system_project","product":"faculty_evaluation_system","cpes":["cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:wordpress:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-18T17:43:09.428860Z","id":"CVE-2023-2369","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-19T18:23:14.591Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:19:14.824Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.227645","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.227645","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/f0llow/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-3.md","tags":["exploit","x_transferred"]}]}]}}