SourceCodester Book Store Management System 1.0 /bsms_ci/index.php access control

A vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. Using CWE to declare the problem leads to CWE-284. The weakness was presented 11/30/2022 by Ngo Van Tu and Huynh Nhat Hao with CMC TSSG. The advisory is shared for download at github.com. This vulnerability was named CVE-2022-4229. The attack can be initiated remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1068. It is declared as proof-of-concept. It is possible to download the exploit at github.com. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Field12/22/2022 08:3412/24/2022 18:1312/24/2022 18:21
vendorSourceCodesterSourceCodesterSourceCodester
nameBook Store Management SystemBook Store Management SystemBook Store Management System
version1.01.01.0
file/bsms_ci/index.php/bsms_ci/index.php/bsms_ci/index.php
cwe284 (access control)284 (access control)284 (access control)
risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-controlhttps://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-controlhttps://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-control
availability111
publicity111
urlhttps://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-controlhttps://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-controlhttps://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-control
cveCVE-2022-4229CVE-2022-4229CVE-2022-4229
responsibleVulDBVulDBVulDB
date1669762800 (11/30/2022)1669762800 (11/30/2022)1669762800 (11/30/2022)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore7.57.57.5
cvss2_vuldb_tempscore6.46.46.4
cvss3_vuldb_basescore7.37.37.3
cvss3_vuldb_tempscore6.66.66.6
cvss3_meta_basescore7.37.38.1
cvss3_meta_tempscore6.66.67.9
price_0day$0-$5k$0-$5k$0-$5k
person_nameNgo Van Tu/Huynh Nhat HaoNgo Van Tu/Huynh Nhat HaoNgo Van Tu/Huynh Nhat Hao
developer_nameNgo Van Tu/Huynh Nhat HaoNgo Van Tu/Huynh Nhat HaoNgo Van Tu/Huynh Nhat Hao
company_nameCMC TSSGCMC TSSGCMC TSSG
cve_assigned1669762800 (11/30/2022)1669762800 (11/30/2022)
cve_nvd_summaryA vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214588.A vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214588.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss3_nvd_basescore9.8
cvss3_cna_basescore7.3

Do you know our Splunk app?

Download it now for free!