cvelist/2023/1xxx/CVE-2023-1441.json

105 lines
3.9 KiB
JSON
Raw Normal View History

2023-03-17 07:00:34 +00:00
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-1441",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin/courses/view_course.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223285 was assigned to this vulnerability."
},
{
"lang": "deu",
"value": "In SourceCodester Automatic Question Paper Generator System 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei admin/courses/view_course.php der Komponente GET Parameter Handler. Durch das Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Automatic Question Paper Generator System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.223285",
"refsource": "MISC",
"name": "https://vuldb.com/?id.223285"
},
{
"url": "https://vuldb.com/?ctiid.223285",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.223285"
},
{
"url": "https://github.com/SecurityYH/bug_report/blob/main/SQLi-1.md",
"refsource": "MISC",
"name": "https://github.com/SecurityYH/bug_report/blob/main/SQLi-1.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "Evan (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
2023-10-21 09:00:43 +00:00
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
2023-03-17 07:00:34 +00:00
}
]
}
}