{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3657","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-07-13T09:48:25.898Z","datePublished":"2023-07-13T10:00:05.373Z","dateUpdated":"2024-08-02T07:01:57.316Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T15:07:37.592Z"},"title":"SourceCodester AC Repair and Services System HTTP POST Request sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"AC Repair and Services System","versions":[{"version":"1.0","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. This issue affects some unknown processing of the file Master.php?f=save_book of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-234011."},{"lang":"de","value":"Eine Schwachstelle wurde in SourceCodester AC Repair and Services System 1.0 entdeckt. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei Master.php?f=save_book der Komponente HTTP POST Request Handler. Durch Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-07-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-07-13T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-07-13T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-08-05T08:24:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"fushuling (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.234011","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.234011","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:01:57.316Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.234011","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.234011","tags":["signature","x_transferred"]}]}]}}