{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10160","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-18T19:16:50.524Z","datePublished":"2024-10-20T00:00:08.224Z","dateUpdated":"2024-10-22T14:27:19.251Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-20T00:00:08.224Z"},"title":"PHPGurukul Boat Booking System BW Dates Report Page bwdates-report-details.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]}],"affected":[{"vendor":"PHPGurukul","product":"Boat Booking System","versions":[{"version":"1.0","status":"affected"}],"modules":["BW Dates Report Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, has been found in PHPGurukul Boat Booking System 1.0. Affected by this issue is some unknown functionality of the file /admin/bwdates-report-details.php of the component BW Dates Report Page. The manipulation of the argument fdate/tdate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"fdate\" to be affected. But it must be assumed \"tdate\" is affected as well."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in PHPGurukul Boat Booking System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /admin/bwdates-report-details.php der Komponente BW Dates Report Page. Mittels Manipulieren des Arguments fdate/tdate mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-10-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-18T21:22:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jadu101 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.280946","name":"VDB-280946 | PHPGurukul Boat Booking System BW Dates Report Page bwdates-report-details.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.280946","name":"VDB-280946 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.425437","name":"Submit #425437 | PHPGurukul Boat Booking System 1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_bwdates_report_details_sqli.md","tags":["exploit"]},{"url":"https://phpgurukul.com/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"phpgurukul","product":"boat_booking_system","cpes":["cpe:2.3:a:phpgurukul:boat_booking_system:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-22T14:26:07.803009Z","id":"CVE-2024-10160","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-22T14:27:19.251Z"}}]}}