{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-9797","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-10T07:27:50.859Z","datePublished":"2024-10-10T16:31:04.826Z","dateUpdated":"2024-10-10T16:53:24.758Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-10T16:31:04.826Z"},"title":"code-projects Blood Bank System register.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]}],"affected":[{"vendor":"code-projects","product":"Blood Bank System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. Affected is an unknown function of the file register.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine Schwachstelle in code-projects Blood Bank System 1.0 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei register.php. Durch das Beeinflussen des Arguments user mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-10-10T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-10T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-10T10:42:08.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"siyuancn (VulDB User)","type":"reporter"},{"lang":"en","value":"siyuancn (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.279948","name":"VDB-279948 | code-projects Blood Bank System register.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.279948","name":"VDB-279948 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.417586","name":"Submit #417586 | code-projects blood-bank-system-in-php v1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/siyuancn-hub/cve/blob/main/sql4-user.md","tags":["exploit"]},{"url":"https://code-projects.org/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"code-projects","product":"blood_bank_system","cpes":["cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-10T16:52:48.377094Z","id":"CVE-2024-9797","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-10T16:53:24.758Z"}}]}}