CVE-2024-10021

A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER. The manipulation of the argument text leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da Exploit Third Party Advisory
https://vuldb.com/?ctiid.280556 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.280556 Third Party Advisory VDB Entry
https://vuldb.com/?submit.424334 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*

History

21 Oct 2024, 13:13

Type Values Removed Values Added
First Time Code-projects pharmacy Management System
Code-projects
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da - () https://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.280556 - () https://vuldb.com/?ctiid.280556 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.280556 - () https://vuldb.com/?id.280556 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.424334 - () https://vuldb.com/?submit.424334 - Third Party Advisory, VDB Entry
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8
CPE cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*
Summary
  • (es) Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0. Se ha calificado como crítica. Este problema afecta a algunas funciones desconocidas del archivo /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER. La manipulación del texto del argumento conduce a una inyección SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho público y puede utilizarse.

16 Oct 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-16 12:15

Updated : 2024-10-21 13:13


NVD link : CVE-2024-10021

Mitre link : CVE-2024-10021

CVE.ORG link : CVE-2024-10021


JSON object : View

Products Affected

code-projects

  • pharmacy_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')