{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5985","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-06-13T18:12:04.624Z","datePublished":"2024-06-14T02:00:04.892Z","dateUpdated":"2024-08-08T14:06:30.340Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-06-14T02:00:04.892Z"},"title":"SourceCodester Best Online News Portal index.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Best Online News Portal","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268461 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Best Online News Portal 1.0 entdeckt. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /admin/index.php. Mittels Manipulieren des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-06-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-06-13T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-06-13T20:17:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xuanluansec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.268461","name":"VDB-268461 | SourceCodester Best Online News Portal index.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.268461","name":"VDB-268461 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.356239","name":"Submit #356239 | SourceCodester Best online news portal project in php free download V1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/CveSecLook/cve/issues/45","tags":["exploit","issue-tracking"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:25:03.169Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.268461","name":"VDB-268461 | SourceCodester Best Online News Portal index.php sql injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.268461","name":"VDB-268461 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.356239","name":"Submit #356239 | SourceCodester Best online news portal project in php free download V1.0 SQL Injection","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/CveSecLook/cve/issues/45","tags":["exploit","issue-tracking","x_transferred"]}]},{"affected":[{"vendor":"sourcecodester","product":"best_online_news_portal","cpes":["cpe:2.3:a:sourcecodester:best_online_news_portal:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-15T20:55:06.826597Z","id":"CVE-2024-5985","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-08T14:06:30.340Z"}}]}}