CVE-2023-1793

A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /officer/assigncase.php of the component GET Parameter Handler. The manipulation of the argument caseid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224745 was assigned to this vulnerability.
References
Link Resource
https://github.com/fillorkill/bug_report/blob/main/SQLi-1.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.224745 Permissions Required Third Party Advisory
https://vuldb.com/?id.224745 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:police_crime_record_management_system_project:police_crime_record_management_system:1.0:*:*:*:*:*:*:*

History

29 Feb 2024, 01:37

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-02 08:15

Updated : 2024-05-17 02:18


NVD link : CVE-2023-1793

Mitre link : CVE-2023-1793

CVE.ORG link : CVE-2023-1793


JSON object : View

Products Affected

police_crime_record_management_system_project

  • police_crime_record_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')