Description
Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the address parameter in the user profile update function.
Affected Software
Related
{"id": "PRION:CVE-2023-24729", "vendorId": null, "type": "prion", "bulletinFamily": "NVD", "title": "Sql injection", "description": "Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the address parameter in the user profile update function.", "published": "2023-03-15T14:15:00", "modified": "2023-03-17T18:52:00", "epss": [{"cve": "CVE-2023-24729", "epss": 0.00058, "percentile": 0.23101, "modified": "2023-11-08"}], "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "severity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "href": "https://www.prio-n.com/kb/vulnerability/CVE-2023-24729", "reporter": "PRIOn knowledge base", "references": ["https://github.com/rahulpatwari/CVE/blob/main/CVE-2023-24729/CVE-2023-24729.txt", "https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html", "https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip"], "cvelist": ["CVE-2023-24729"], "immutableFields": [], "lastseen": "2023-11-18T22:45:11", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2023-24729"]}]}, "score": {"value": 8.9, "uncertanity": 0.0, "vector": "NONE"}, "vulnersScore": 8.9}, "_state": {"dependencies": 1700347656, "score": 1700347563}, "_internal": {"score_hash": "33417ec6cb634532ea67ece8d0e62596"}, "affectedSoftware": [{"version": "1.0", "operator": "eq", "name": "simple_customer_relationship_management_system"}], "vendor_cvss2": {"score": "6.5", "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "vendor_cvss3": {}}
{"cve": [{"lastseen": "2023-11-08T18:18:13", "description": "Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the address parameter in the user profile update function.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-03-15T14:15:00", "type": "cve", "title": "CVE-2023-24729", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-24729"], "modified": "2023-03-17T18:52:00", "cpe": ["cpe:/a:simple_customer_relationship_management_system_project:simple_customer_relationship_management_system:1.0"], "id": "CVE-2023-24729", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24729", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:simple_customer_relationship_management_system_project:simple_customer_relationship_management_system:1.0:*:*:*:*:*:*:*"]}]}