mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
52 lines
2.4 KiB
JSON
52 lines
2.4 KiB
JSON
{
|
|
"id": "CVE-2024-29390",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-06-20T21:15:49.583",
|
|
"lastModified": "2024-11-21T09:07:59.560",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Daily Expenses Management System version 1.0, developed by PHP Gurukul, contains a time-based blind SQL injection vulnerability in the 'add-expense.php' page. An attacker can exploit the 'item' parameter in a POST request to execute arbitrary SQL commands in the backend database. This can be done by injecting specially crafted SQL queries that make the database perform time-consuming operations, thereby confirming the presence of the SQL injection vulnerability based on the delay in the server's response."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La versi\u00f3n 1.0 de Daily Expenses Management System, desarrollado por PHP Gurukul, contiene una vulnerabilidad de inyecci\u00f3n SQL ciega basada en el tiempo en la p\u00e1gina 'add-expense.php'. Un atacante puede explotar el par\u00e1metro 'elemento' en una solicitud POST para ejecutar comandos SQL arbitrarios en la base de datos backend. Esto se puede hacer inyectando consultas SQL especialmente manipuladas que hacen que la base de datos realice operaciones que consumen mucho tiempo, confirmando as\u00ed la presencia de la vulnerabilidad de inyecci\u00f3n SQL basada en el retraso en la respuesta del servidor."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseScore": 7.3,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.4
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/CyberSentryX/CVE_Hunting/blob/main/CVE-2024-29390/README.md",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://github.com/CyberSentryX/CVE_Hunting/blob/main/CVE-2024-29390/README.md",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |