{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3678","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-07-15T07:28:44.308Z","datePublished":"2023-07-15T08:00:04.152Z","dateUpdated":"2024-08-02T07:01:57.365Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T15:13:43.573Z"},"title":"SourceCodester AC Repair and Services System HTTP POST Request sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"AC Repair and Services System","versions":[{"version":"1.0","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_inquiry of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-234223."},{"lang":"de","value":"In SourceCodester AC Repair and Services System 1.0 wurde eine kritische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /classes/Master.php?f=delete_inquiry der Komponente HTTP POST Request Handler. Dank der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-07-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-07-15T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-07-15T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-08-06T08:54:02.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"L2ncE (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.234223","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.234223","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:01:57.365Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.234223","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.234223","tags":["signature","x_transferred"]}]}]}}