cvelist/2024/5xxx/CVE-2024-5359.json
2024-05-26 11:00:33 +00:00

110 lines
4.0 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-5359",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been classified as critical. This affects an unknown part of the file /admin/foreigner-search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266271."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in PHPGurukul Zoo Management System 2.1 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /admin/foreigner-search.php. Mittels dem Manipulieren des Arguments searchdata mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHPGurukul",
"product": {
"product_data": [
{
"product_name": "Zoo Management System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.266271",
"refsource": "MISC",
"name": "https://vuldb.com/?id.266271"
},
{
"url": "https://vuldb.com/?ctiid.266271",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.266271"
},
{
"url": "https://vuldb.com/?submit.343716",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.343716"
},
{
"url": "https://www.yuque.com/yuqueyonghunhj6tg/ygf5oy/cznh8x2li4fmds4d",
"refsource": "MISC",
"name": "https://www.yuque.com/yuqueyonghunhj6tg/ygf5oy/cznh8x2li4fmds4d"
}
]
},
"credits": [
{
"lang": "en",
"value": "XbnWa (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}
}