CVE-2024-13036

A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/update_room.php. The manipulation of the argument id/name/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://vuldb.com/?ctiid.289769 Permissions Required
https://vuldb.com/?id.289769 Permissions Required
https://vuldb.com/?submit.471113 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*

History

06 Jan 2025, 17:26

Type Values Removed Values Added
First Time Fabianros
Fabianros chat System
Summary
  • (es) Se ha encontrado una vulnerabilidad en code-projects Chat System 1.0 y se ha clasificado como crítica. Este problema afecta a algunos procesos desconocidos del archivo /admin/update_room.php. La manipulación del argumento id/name/password provoca una inyección SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho público y puede utilizarse.
CPE cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://vuldb.com/?ctiid.289769 - () https://vuldb.com/?ctiid.289769 - Permissions Required
References () https://vuldb.com/?id.289769 - () https://vuldb.com/?id.289769 - Permissions Required
References () https://vuldb.com/?submit.471113 - () https://vuldb.com/?submit.471113 - Third Party Advisory

30 Dec 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-30 03:15

Updated : 2025-01-06 17:26


NVD link : CVE-2024-13036

Mitre link : CVE-2024-13036

CVE.ORG link : CVE-2024-13036


JSON object : View

Products Affected

fabianros

  • chat_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')