{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8220","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-08-27T12:40:33.915Z","datePublished":"2024-08-27T22:00:05.443Z","dateUpdated":"2024-08-28T14:02:24.499Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-08-27T22:00:05.443Z"},"title":"itsourcecode Tailoring Management System staffedit.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"itsourcecode","product":"Tailoring Management System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file staffedit.php. The manipulation of the argument id/stafftype/address/fullname/phonenumber/salary leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"In itsourcecode Tailoring Management System 1.0 wurde eine kritische Schwachstelle ausgemacht. Hierbei betrifft es unbekannten Programmcode der Datei staffedit.php. Mittels dem Manipulieren des Arguments id/stafftype/address/fullname/phonenumber/salary mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-08-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-08-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-08-27T14:46:03.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"dd456 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.275929","name":"VDB-275929 | itsourcecode Tailoring Management System staffedit.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.275929","name":"VDB-275929 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.398209","name":"Submit #398209 | Itsourcecode Tailoring Management System Project In PHP 1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/dd456-dd/cve/issues/1","tags":["exploit","issue-tracking"]},{"url":"https://itsourcecode.com/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"itsourcecode","product":"tailoring_management_system","cpes":["cpe:2.3:a:itsourcecode:tailoring_management_system:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-28T13:54:37.713047Z","id":"CVE-2024-8220","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-28T14:02:24.499Z"}}]}}