We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-5270

SourceCodester Best Courier Management System view_parcel.php sql injection



AssignerVulDB
Reserved2023-09-29
Published2023-09-29
Updated2024-08-02

Description

EN DE

A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view_parcel.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240883.

In SourceCodester Best Courier Management System 1.0 wurde eine kritische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei view_parcel.php. Mittels dem Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung.



MEDIUM: 5.5CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
MEDIUM: 5.5CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.2CVSS:2.0/AV:A/AC:L/Au:S/C:P/I:P/A:P

Problem types

CWE-89 SQL Injection

Product status

1.0
affected

Timeline

2023-09-29:Advisory disclosed
2023-09-29:CVE reserved
2023-09-29:VulDB entry created
2023-10-22:VulDB entry last update

Credits

SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) 0x40080d9d10

References

https://vuldb.com/?id.240883 vdb-entry technical-description

https://vuldb.com/?ctiid.240883 signature permissions-required

https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%202.pdf exploit

cve.org CVE-2023-5270

nvd.nist.gov CVE-2023-5270

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.