{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-33584","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-09-16T21:38:47.357Z","dateReserved":"2023-05-22T00:00:00.000Z","datePublished":"2023-06-21T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-04-22T20:24:43.804Z"},"descriptions":[{"lang":"en","value":"Sourcecodester Enrollment System Project V1.0 is vulnerable to SQL Injection (SQLI) attacks, which allow an attacker to manipulate the SQL queries executed by the application. The application fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.sourcecodester.com/php/14444/enrollment-system-project-source-code-using-phpmysql.html"},{"url":"http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html"},{"url":"https://www.exploit-db.com/exploits/51501"},{"url":"https://packetstormsecurity.com/files/cve/CVE-2023-33584"},{"url":"https://github.com/sudovivek/My-CVE/blob/main/CVE-2023-33584_exploit.md"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"}]}],"affected":[{"vendor":"enrollment_system_project","product":"enrollment_system","cpes":["cpe:2.3:a:enrollment_system_project:enrollment_system:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-09-16T21:38:36.514599Z","id":"CVE-2023-33584","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-16T21:38:47.357Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:47:05.800Z"},"title":"CVE Program Container","references":[{"url":"https://www.sourcecodester.com/php/14444/enrollment-system-project-source-code-using-phpmysql.html","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html","tags":["x_transferred"]},{"url":"https://www.exploit-db.com/exploits/51501","tags":["x_transferred"]},{"url":"https://packetstormsecurity.com/files/cve/CVE-2023-33584","tags":["x_transferred"]},{"url":"https://github.com/sudovivek/My-CVE/blob/main/CVE-2023-33584_exploit.md","tags":["x_transferred"]}]}]}}