{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4869","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-09-09T08:15:39.948Z","datePublished":"2023-09-10T01:00:08.632Z","dateUpdated":"2024-09-26T15:18:52.535Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-24T16:10:55.727Z"},"title":"SourceCodester Contact Manager App update.php cross-site request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-352","lang":"en","description":"CWE-352 Cross-Site Request Forgery"}]}],"affected":[{"vendor":"SourceCodester","product":"Contact Manager App","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Contact Manager App 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file update.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-239354 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in SourceCodester Contact Manager App 1.0 ausgemacht. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei update.php. Mittels dem Manipulieren mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-09-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-09-09T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-09-09T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-10-04T15:47:02.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"gikaku (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.239354","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.239354","tags":["signature","permissions-required"]},{"url":"https://skypoc.wordpress.com/2023/09/05/vuln1/","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:38:00.811Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.239354","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.239354","tags":["signature","permissions-required","x_transferred"]},{"url":"https://skypoc.wordpress.com/2023/09/05/vuln1/","tags":["exploit","x_transferred"]}]},{"affected":[{"vendor":"contact_manager_app_project","product":"contact_manager_app","cpes":["cpe:2.3:a:contact_manager_app_project:contact_manager_app:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-26T15:18:12.992379Z","id":"CVE-2023-4869","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-26T15:18:52.535Z"}}]}}