cvelist/2024/6xxx/CVE-2024-6278.json

114 lines
4.3 KiB
JSON
Raw Normal View History

2024-06-23 19:00:33 +00:00
{
2024-06-24 03:00:35 +00:00
"data_version": "4.0",
2024-06-23 19:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-6278",
2024-06-24 03:00:35 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-06-23 19:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-24 03:00:35 +00:00
"value": "A vulnerability has been found in lahirudanushka School Management System 1.0.0/1.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file subject.php of the component Subject Page. The manipulation of the argument update leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269491."
},
{
"lang": "deu",
"value": "In lahirudanushka School Management System 1.0.0/1.0.1 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei subject.php der Komponente Subject Page. Mit der Manipulation des Arguments update mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "lahirudanushka",
"product": {
"product_data": [
{
"product_name": "School Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.0"
},
{
"version_affected": "=",
"version_value": "1.0.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.269491",
"refsource": "MISC",
"name": "https://vuldb.com/?id.269491"
},
{
"url": "https://vuldb.com/?ctiid.269491",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.269491"
},
{
"url": "https://vuldb.com/?submit.362883",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.362883"
},
{
"url": "https://powerful-bulb-c36.notion.site/sql-injection-5-f0e968979e3c47049ed5965ca3a7ed7e",
"refsource": "MISC",
"name": "https://powerful-bulb-c36.notion.site/sql-injection-5-f0e968979e3c47049ed5965ca3a7ed7e"
}
]
},
"credits": [
{
"lang": "en",
"value": "louay khammassi (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 4.7,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 4.7,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P"
2024-06-23 19:00:33 +00:00
}
]
}
}