{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-46789", "ASSIGNER": "help@fluidattacks.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'filename' attribute of the 'pic1' multipart parameter of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "cweId": "CWE-89" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Projectworlds Pvt. Limited", "product": { "product_data": [ { "product_name": "Online Matrimonial Project", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.0" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://fluidattacks.com/advisories/ros", "refsource": "MISC", "name": "https://fluidattacks.com/advisories/ros" }, { "url": "https://projectworlds.in", "refsource": "MISC", "name": "https://projectworlds.in" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "discovery": "UNKNOWN" }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] } }