A vulnerability was found in SourceCodester Alphaware Simple E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file function/edit_customer.php. The manipulation of the argument firstname/mi/lastname with the input a' RLIKE SLEEP(5) AND 'dAbu'='dAbu leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-223406 is the identifier assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://vuldb.com/?ctiid.223406 | Exploit Third Party Advisory |
| https://vuldb.com/?id.223406 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.223406 | Exploit Third Party Advisory |
| https://vuldb.com/?id.223406 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://vuldb.com/?ctiid.223406 - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?id.223406 - Exploit, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 5.1
v3 : 5.6 |
16 Feb 2024, 17:46
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 5.1
v3 : 8.1 |
23 Mar 2023, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:alphaware_-_simple_e-commerce_system_project:alphaware_-_simple_e-commerce_system:1.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | (MISC) https://vuldb.com/?id.223406 - Exploit, Third Party Advisory | |
| References | (MISC) https://vuldb.com/?ctiid.223406 - Exploit, Third Party Advisory |
20 Mar 2023, 14:02
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-20 09:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1502
Mitre link : CVE-2023-1502
CVE.ORG link : CVE-2023-1502
JSON object : View
Products Affected
alphaware_-_simple_e-commerce_system_project
- alphaware_-_simple_e-commerce_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
