{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2594","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-09T12:12:49.383Z","datePublished":"2023-05-09T12:31:03.673Z","dateUpdated":"2024-08-02T06:26:09.706Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T05:29:39.864Z"},"title":"SourceCodester Food Ordering Management System Registration sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Food Ordering Management System","versions":[{"version":"1.0","status":"affected"}],"modules":["Registration"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in SourceCodester Food Ordering Management System 1.0. Affected is an unknown function of the component Registration. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-228396."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Food Ordering Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Komponente Registration. Durch die Manipulation des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-05-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-09T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-09T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-01T08:00:46.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"dewanritik (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.228396","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.228396","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:26:09.706Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.228396","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.228396","tags":["signature","x_transferred"]}]}]}}