{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10426","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-26T14:11:30.491Z","datePublished":"2024-10-27T19:31:03.589Z","dateUpdated":"2024-10-28T19:07:38.207Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-27T19:31:03.589Z"},"title":"Codezips Pet Shop Management System animalsadd.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]}],"affected":[{"vendor":"Codezips","product":"Pet Shop Management System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /animalsadd.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter \"refno\" to be affected. But further inspection indicates that the name of the affected parameter is \"id\"."},{"lang":"de","value":"Es wurde eine Schwachstelle in Codezips Pet Shop Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /animalsadd.php. Durch Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-10-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-26T16:16:42.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XU RONGDA (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.281967","name":"VDB-281967 | Codezips Pet Shop Management System animalsadd.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.281967","name":"VDB-281967 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.432132","name":"Submit #432132 | Codezips Pet Shop Management System In PHP With Source Code V1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/ppp-src/CVE/issues/21","tags":["exploit","issue-tracking"]}]},"adp":[{"affected":[{"vendor":"codezips","product":"pet_shop_management_system","cpes":["cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-28T17:14:30.331063Z","id":"CVE-2024-10426","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-28T19:07:38.207Z"}}]}}