We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-4749

SourceCodester Inventory Management System index.php file inclusion



AssignerVulDB
Reserved2023-09-03
Published2023-09-04
Updated2024-08-02

Description

EN DE

A vulnerability, which was classified as critical, was found in SourceCodester Inventory Management System 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to file inclusion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-238638 is the identifier assigned to this vulnerability.

Es wurde eine Schwachstelle in SourceCodester Inventory Management System 1.0 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei index.php. Durch Manipulation des Arguments page mit unbekannten Daten kann eine file inclusion-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.



MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.5CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:P/A:P

Problem types

CWE-73 File Inclusion

Product status

1.0
affected

Timeline

2023-09-03:Advisory disclosed
2023-09-03:CVE reserved
2023-09-03:VulDB entry created
2023-09-29:VulDB entry last update

Credits

gikaku (VulDB User) 0x40060b1580

References

https://vuldb.com/?id.238638 vdb-entry technical-description

https://vuldb.com/?ctiid.238638 signature permissions-required

https://skypoc.wordpress.com/2023/09/03/%e3%80%90code-audit%e3%80%91open-source-ample-inventory-management-system-v1-0-by-mayuri_k-has-a-file-inclusion-vulnerability/ exploit

cve.org CVE-2023-4749

nvd.nist.gov CVE-2023-4749

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.