{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3042","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-03-28T09:28:26.703Z","datePublished":"2024-03-28T15:00:06.943Z","dateUpdated":"2024-08-01T19:32:42.734Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-03-28T15:00:06.943Z"},"title":"SourceCodester Simple Subscription Website manage_user.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Simple Subscription Website","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Simple Subscription Website 1.0 and classified as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258431."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in SourceCodester Simple Subscription Website 1.0 gefunden. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei manage_user.php. Durch Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-03-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-03-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-03-28T10:33:39.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"shaozhenghao666 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.258431","name":"VDB-258431 | SourceCodester Simple Subscription Website manage_user.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.258431","name":"VDB-258431 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.306119","name":"Submit #306119 | Simple Subscription Website with Admin System Simple Subscription Website with Admin System 1.0 Sqlinjection","tags":["third-party-advisory"]},{"url":"https://github.com/maxmvp666/planCve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_user.php%20has%20Sqlinjection.pdf","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-3042","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-28T19:39:58.482193Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T17:21:21.079Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:32:42.734Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.258431","name":"VDB-258431 | SourceCodester Simple Subscription Website manage_user.php sql injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.258431","name":"VDB-258431 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.306119","name":"Submit #306119 | Simple Subscription Website with Admin System Simple Subscription Website with Admin System 1.0 Sqlinjection","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/maxmvp666/planCve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_user.php%20has%20Sqlinjection.pdf","tags":["exploit","x_transferred"]}]}]}}