{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0265","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-06T08:52:23.060Z","datePublished":"2024-01-07T05:00:04.362Z","dateUpdated":"2025-06-09T18:02:28.005Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-01-07T05:00:04.362Z"},"title":"SourceCodester Clinic Queuing System GET Parameter index.php file inclusion","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-73","lang":"en","description":"CWE-73 File Inclusion"}]}],"affected":[{"vendor":"SourceCodester","product":"Clinic Queuing System","versions":[{"version":"1.0","status":"affected"}],"modules":["GET Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /index.php of the component GET Parameter Handler. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249821 was assigned to this vulnerability."},{"lang":"de","value":"Eine Schwachstelle wurde in SourceCodester Clinic Queuing System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /index.php der Komponente GET Parameter Handler. Dank der Manipulation des Arguments page mit unbekannten Daten kann eine file inclusion-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-06T16:27:07.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Echidonut (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.249821","tags":["vdb-entry","technical-description","exploit"]},{"url":"https://vuldb.com/?ctiid.249821","tags":["signature","permissions-required"]},{"url":"https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE","tags":["related"]},{"url":"https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T17:41:16.428Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.249821","tags":["vdb-entry","technical-description","exploit","x_transferred"]},{"url":"https://vuldb.com/?ctiid.249821","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE","tags":["related","x_transferred"]},{"url":"https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-31T20:40:38.659097Z","id":"CVE-2024-0265","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-09T18:02:28.005Z"}}]}}