cvelist/2022/4xxx/CVE-2022-4222.json

77 lines
2.6 KiB
JSON
Raw Normal View History

2022-11-30 06:00:35 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4222",
2022-11-30 07:54:50 +01:00
"TITLE": "SourceCodester Canteen Management System POST Request ajax_invoice.php query sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Canteen Management System",
"version": {
"version_data": [
{
2022-11-30 07:00:37 +00:00
"version_value": "n/a"
2022-11-30 07:54:50 +01:00
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-89 SQL Injection"
}
]
}
]
2022-11-30 06:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-11-30 07:54:50 +01:00
"value": "A vulnerability was found in SourceCodester Canteen Management System. It has been rated as critical. This issue affects the function query of the file ajax_invoice.php of the component POST Request Handler. The manipulation of the argument search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214523."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "5.0",
2022-11-30 07:00:37 +00:00
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
2022-11-30 07:54:50 +01:00
}
},
"references": {
"reference_data": [
{
2022-11-30 07:00:37 +00:00
"url": "https://www.jianshu.com/p/bda61089bf1d",
"refsource": "MISC",
"name": "https://www.jianshu.com/p/bda61089bf1d"
2022-11-30 07:54:50 +01:00
},
{
2022-11-30 07:00:37 +00:00
"url": "https://vuldb.com/?id.214523",
"refsource": "MISC",
"name": "https://vuldb.com/?id.214523"
2022-11-30 06:00:35 +00:00
}
]
}
}