SQL injection vulnerability in SourceCodester Water Billing System 1.0 via the username and password parameters to process.php.
References
Link | Resource |
---|---|
https://github.com/sartlabs/0days/tree/main/WBS | Third Party Advisory |
https://research-labs.net/search/exploits/water-billing-system-10-username-and-password-parameters-sql-injection | Broken Link |
https://www.exploit-db.com/exploits/49032 | Exploit Third Party Advisory VDB Entry |
https://github.com/sartlabs/0days/tree/main/WBS | Third Party Advisory |
https://research-labs.net/search/exploits/water-billing-system-10-username-and-password-parameters-sql-injection | Broken Link |
https://www.exploit-db.com/exploits/49032 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sartlabs/0days/tree/main/WBS - Third Party Advisory | |
References | () https://research-labs.net/search/exploits/water-billing-system-10-username-and-password-parameters-sql-injection - Broken Link | |
References | () https://www.exploit-db.com/exploits/49032 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-11-17 23:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28183
Mitre link : CVE-2020-28183
CVE.ORG link : CVE-2020-28183
JSON object : View
Products Affected
water_billing_system_project
- water_billing_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')