{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2694","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-14T07:52:33.707Z","datePublished":"2023-05-14T10:00:04.635Z","dateUpdated":"2024-11-22T15:43:22.674Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T06:16:02.927Z"},"title":"SourceCodester Online Exam System POST Parameter data sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Online Exam System","versions":[{"version":"1.0","status":"affected"}],"modules":["POST Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Online Exam System 1.0. It has been classified as critical. This affects an unknown part of the file /dosen/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228975."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Online Exam System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion der Datei /dosen/data der Komponente POST Parameter Handler. Durch Beeinflussen des Arguments columns[1][data] mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-05-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-14T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-14T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-08T17:01:50.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"huutuanbg97 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.228975","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.228975","tags":["signature","permissions-required"]},{"url":"https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/img/dosen_data.png","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:33:05.778Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.228975","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.228975","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/img/dosen_data.png","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-22T15:43:13.776691Z","id":"CVE-2023-2694","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-22T15:43:22.674Z"}}]}}