{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0347","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-09T14:13:42.673Z","datePublished":"2024-01-09T21:31:04.011Z","dateUpdated":"2024-11-14T16:32:26.939Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-01-09T21:31:04.011Z"},"title":"SourceCodester Engineers Online Portal signup_teacher.php weak password","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-521","lang":"en","description":"CWE-521 Weak Password Requirements"}]}],"affected":[{"vendor":"SourceCodester","product":"Engineers Online Portal","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file signup_teacher.php. The manipulation of the argument Password leads to weak password requirements. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250115."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in SourceCodester Engineers Online Portal 1.0 gefunden. Davon betroffen ist unbekannter Code der Datei signup_teacher.php. Durch Manipulieren des Arguments Password mit unbekannten Daten kann eine weak password requirements-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2024-01-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-09T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-09T15:19:06.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ahmed8199 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.250115","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.250115","tags":["signature","permissions-required"]},{"url":"https://mega.nz/file/2d8GiY4Z#QSKItMUgIsW1-A-QPs9dgUSd2SCZfDg4aHORttFpUF0","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:04:48.558Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.250115","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.250115","tags":["signature","permissions-required","x_transferred"]},{"url":"https://mega.nz/file/2d8GiY4Z#QSKItMUgIsW1-A-QPs9dgUSd2SCZfDg4aHORttFpUF0","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-14T16:31:38.771495Z","id":"CVE-2024-0347","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-14T16:32:26.939Z"}}]}}