cvelist/2024/6xxx/CVE-2024-6802.json

120 lines
4.3 KiB
JSON
Raw Normal View History

2024-07-16 20:00:33 +00:00
{
2024-07-17 02:00:32 +00:00
"data_version": "4.0",
2024-07-16 20:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-6802",
2024-07-17 02:00:32 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-07-16 20:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-08-26 05:00:35 +00:00
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
2024-07-17 02:00:32 +00:00
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in SourceCodester Computer Laboratory Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /lms/classes/Master.php?f=save_record. Durch Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Computer Laboratory Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.271704",
"refsource": "MISC",
"name": "https://vuldb.com/?id.271704"
},
{
"url": "https://vuldb.com/?ctiid.271704",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.271704"
},
{
"url": "https://vuldb.com/?submit.374797",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.374797"
},
{
2024-08-26 05:00:35 +00:00
"url": "https://reports.kunull.net/CVEs/CVE-2024-6802",
2024-07-17 02:00:32 +00:00
"refsource": "MISC",
2024-08-26 05:00:35 +00:00
"name": "https://reports.kunull.net/CVEs/CVE-2024-6802"
2024-08-06 12:00:36 +00:00
},
{
2024-08-26 05:00:35 +00:00
"url": "https://reports.kunull.net/CVEs/2024/CVE-2024-6802",
2024-08-06 12:00:36 +00:00
"refsource": "MISC",
2024-08-26 05:00:35 +00:00
"name": "https://reports.kunull.net/CVEs/2024/CVE-2024-6802"
},
{
"url": "https://www.sourcecodester.com/",
"refsource": "MISC",
"name": "https://www.sourcecodester.com/"
2024-07-17 02:00:32 +00:00
}
]
},
"credits": [
2024-07-21 14:00:34 +00:00
{
"lang": "en",
"value": "Kunal Walavalkar"
2024-07-17 02:00:32 +00:00
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
2024-07-16 20:00:33 +00:00
}
]
}
}