2023-12-21 17:00:28 +00:00
{
"id" : "CVE-2023-45118" ,
"sourceIdentifier" : "help@fluidattacks.com" ,
"published" : "2023-12-21T16:15:08.750" ,
2023-12-27 23:00:28 +00:00
"lastModified" : "2023-12-27T21:38:08.260" ,
"vulnStatus" : "Analyzed" ,
2023-12-21 17:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities.\u00a0The 'fdid' parameter of the update.php resource\u00a0does not validate the characters received and they\u00a0are sent unfiltered to the database.\n\n"
2023-12-27 23:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Online Examination System v1.0 es afectado por m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL autenticadas. El par\u00e1metro 'fdid' del recurso update.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
2023-12-21 17:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2023-12-27 23:00:28 +00:00
"source" : "nvd@nist.gov" ,
2023-12-21 17:00:28 +00:00
"type" : "Primary" ,
2023-12-27 23:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
} ,
{
"source" : "help@fluidattacks.com" ,
"type" : "Secondary" ,
2023-12-21 17:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "help@fluidattacks.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2023-12-27 23:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:projectworlds:online_examination_system:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "32029B59-C9C3-4474-8BF6-D5A0410EB748"
}
]
}
]
}
] ,
2023-12-21 17:00:28 +00:00
"references" : [
{
"url" : "https://fluidattacks.com/advisories/argerich/" ,
2023-12-27 23:00:28 +00:00
"source" : "help@fluidattacks.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-12-21 17:00:28 +00:00
} ,
{
"url" : "https://projectworlds.in/" ,
2023-12-27 23:00:28 +00:00
"source" : "help@fluidattacks.com" ,
"tags" : [
"Product"
]
2023-12-21 17:00:28 +00:00
}
]
}