{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3360","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-04-05T06:01:56.054Z","datePublished":"2024-04-06T04:31:05.026Z","dateUpdated":"2024-08-01T20:05:08.507Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-04-06T04:31:05.026Z"},"title":"SourceCodester Online Library System index.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Online Library System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in SourceCodester Online Library System 1.0. Affected is an unknown function of the file admin/books/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259464."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Online Library System 1.0 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei admin/books/index.php. Durch das Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-04-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-04-05T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-04-05T08:07:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"liuann (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.259464","name":"VDB-259464 | SourceCodester Online Library System index.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.259464","name":"VDB-259464 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.310424","name":"Submit #310424 | https://www.sourcecodester.com/ Online Library System 1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-02","tags":["exploit"]}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-3360","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-06-04T13:31:56.354657Z"}}}],"affected":[{"cpes":["cpe:2.3:a:sourcecodester:online_library_system:1.0:*:*:*:*:*:*:*"],"vendor":"sourcecodester","product":"online_library_system","versions":[{"status":"affected","version":"1.0"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:32:59.147Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:05:08.507Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.259464","name":"VDB-259464 | SourceCodester Online Library System index.php sql injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.259464","name":"VDB-259464 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.310424","name":"Submit #310424 | https://www.sourcecodester.com/ Online Library System 1.0 SQL Injection","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-02","tags":["exploit","x_transferred"]}]}]}}