CVE-2022-3118

A vulnerability was found in Sourcecodehero ERP System Project. It has been rated as critical. This issue affects some unknown processing of the file /pages/processlogin.php. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207845 was assigned to this vulnerability.
References
Link Resource
https://s2.loli.net/2022/09/02/N4FESXldmKWvQOw.png Exploit Third Party Advisory
https://vuldb.com/?id.207845 Third Party Advisory
https://s2.loli.net/2022/09/02/N4FESXldmKWvQOw.png Exploit Third Party Advisory
https://vuldb.com/?id.207845 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:erp_system_project_project:erp_system_project:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:18

Type Values Removed Values Added
References () https://s2.loli.net/2022/09/02/N4FESXldmKWvQOw.png - Exploit, Third Party Advisory () https://s2.loli.net/2022/09/02/N4FESXldmKWvQOw.png - Exploit, Third Party Advisory
References () https://vuldb.com/?id.207845 - Third Party Advisory () https://vuldb.com/?id.207845 - Third Party Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.3

09 Sep 2022, 12:09

Type Values Removed Values Added
References (MISC) https://s2.loli.net/2022/09/02/N4FESXldmKWvQOw.png - (MISC) https://s2.loli.net/2022/09/02/N4FESXldmKWvQOw.png - Exploit, Third Party Advisory
References (MISC) https://vuldb.com/?id.207845 - (MISC) https://vuldb.com/?id.207845 - Third Party Advisory
CPE cpe:2.3:a:erp_system_project_project:erp_system_project:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

05 Sep 2022, 03:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-04 09:15

Updated : 2024-11-21 07:18


NVD link : CVE-2022-3118

Mitre link : CVE-2022-3118

CVE.ORG link : CVE-2022-3118


JSON object : View

Products Affected

erp_system_project_project

  • erp_system_project
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')