cvelist/2024/5xxx/CVE-2024-5357.json

110 lines
4.0 KiB
JSON
Raw Normal View History

2024-05-25 06:00:35 +00:00
{
2024-05-26 09:00:33 +00:00
"data_version": "4.0",
2024-05-25 06:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-5357",
2024-05-26 09:00:33 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-05-25 06:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-05-26 09:00:33 +00:00
"value": "A vulnerability has been found in PHPGurukul Zoo Management System 2.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266269 was assigned to this vulnerability."
},
{
"lang": "deu",
"value": "In PHPGurukul Zoo Management System 2.1 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /admin/forgot-password.php. Durch die Manipulation des Arguments email mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHPGurukul",
"product": {
"product_data": [
{
"product_name": "Zoo Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.266269",
"refsource": "MISC",
"name": "https://vuldb.com/?id.266269"
},
{
"url": "https://vuldb.com/?ctiid.266269",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.266269"
},
{
"url": "https://vuldb.com/?submit.343372",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.343372"
},
{
"url": "https://www.yuque.com/yuqueyonghunhj6tg/ygf5oy/wzxsew2dfb84l3lo",
"refsource": "MISC",
"name": "https://www.yuque.com/yuqueyonghunhj6tg/ygf5oy/wzxsew2dfb84l3lo"
}
]
},
"credits": [
{
"lang": "en",
"value": "XbnWa (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 7.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "3.0",
"baseScore": 7.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
},
{
"version": "2.0",
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
2024-05-25 06:00:35 +00:00
}
]
}
}