{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2815","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-19T15:30:09.832Z","datePublished":"2023-05-19T16:31:03.368Z","dateUpdated":"2024-08-02T06:33:05.795Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T06:46:33.323Z"},"title":"SourceCodester Online Jewelry Store POST Parameter supplier.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Online Jewelry Store","versions":[{"version":"1.0","status":"affected"}],"modules":["POST Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in SourceCodester Online Jewelry Store 1.0. Affected by this vulnerability is an unknown functionality of the file supplier.php of the component POST Parameter Handler. The manipulation of the argument suppid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229429 was assigned to this vulnerability."},{"lang":"de","value":"In SourceCodester Online Jewelry Store 1.0 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es unbekannten Programmcode der Datei supplier.php der Komponente POST Parameter Handler. Mit der Manipulation des Arguments suppid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-05-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-19T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-14T13:43:31.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"likaiwen (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.229429","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.229429","tags":["signature","permissions-required"]},{"url":"https://github.com/raozhir/CVERequest/blob/main/SQL.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:33:05.795Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.229429","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.229429","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/raozhir/CVERequest/blob/main/SQL.md","tags":["exploit","x_transferred"]}]}]}}