{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2865","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-24T09:38:59.420Z","datePublished":"2023-05-24T10:31:04.666Z","dateUpdated":"2024-08-02T06:33:05.658Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T06:56:18.667Z"},"title":"SourceCodester Theme Park Ticketing System GET Parameter print_ticket.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Theme Park Ticketing System","versions":[{"version":"1.0","status":"affected"}],"modules":["GET Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Theme Park Ticketing System 1.0. It has been classified as critical. This affects an unknown part of the file print_ticket.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229821 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Theme Park Ticketing System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei print_ticket.php der Komponente GET Parameter Handler. Durch das Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-05-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-24T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-24T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-17T08:15:38.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"dengbaihao (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.229821","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.229821","tags":["signature","permissions-required"]},{"url":"https://github.com/XIAONIGM/CVEReport/blob/main/SQL.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:33:05.658Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.229821","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.229821","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/XIAONIGM/CVEReport/blob/main/SQL.md","tags":["exploit","x_transferred"]}]}]}}