{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2265","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-03-07T14:34:25.332Z","datePublished":"2024-03-07T21:31:05.029Z","dateUpdated":"2024-08-01T19:03:39.312Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-03-07T21:31:05.029Z"},"title":"keerti1924 PHP-MYSQL-User-Login-System login.sql inclusion of sensitive information in source code","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-540","lang":"en","description":"CWE-540 Inclusion of Sensitive Information in Source Code"}]}],"affected":[{"vendor":"keerti1924","product":"PHP-MYSQL-User-Login-System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in keerti1924 PHP-MYSQL-User-Login-System 1.0. This affects an unknown part of the file login.sql. The manipulation leads to inclusion of sensitive information in source code. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256035. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in keerti1924 PHP-MYSQL-User-Login-System 1.0 gefunden. Es betrifft eine unbekannte Funktion der Datei login.sql. Durch Beeinflussen mit unbekannten Daten kann eine inclusion of sensitive information in source code-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2024-03-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-03-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-03-07T15:39:57.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"reiginald (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.256035","name":"VDB-256035 | keerti1924 PHP-MYSQL-User-Login-System login.sql inclusion of sensitive information in source code","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.256035","name":"VDB-256035 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20publicly%20exposed%20password%20hashes.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"keerti1924","product":"php-mysql-user-login-system","cpes":["cpe:2.3:a:keerti1924:php-mysql-user-login-system:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-16T14:08:03.320480Z","id":"CVE-2024-2265","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-16T16:04:42.251Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:03:39.312Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.256035","name":"VDB-256035 | keerti1924 PHP-MYSQL-User-Login-System login.sql inclusion of sensitive information in source code","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.256035","name":"VDB-256035 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20publicly%20exposed%20password%20hashes.md","tags":["exploit","x_transferred"]}]}]}}