CVE-2024-3621

A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified as critical. This affects an unknown part of the file /control/register_case.php. The manipulation of the argument title/case_no/client_name/court/case_type/case_stage/legel_acts/description/filling_date/hearing_date/opposite_lawyer/total_fees/unpaid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260277 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*

History

30 Jan 2025, 14:40

Type Values Removed Values Added
First Time Mayurik
Mayurik advocate Office Management System
CPE cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*
References () https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md - () https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md - Exploit
References () https://vuldb.com/?ctiid.260277 - () https://vuldb.com/?ctiid.260277 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.260277 - () https://vuldb.com/?id.260277 - VDB Entry
References () https://vuldb.com/?submit.312832 - () https://vuldb.com/?submit.312832 - VDB Entry

21 Nov 2024, 09:30

Type Values Removed Values Added
References () https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md - () https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md -
References () https://vuldb.com/?ctiid.260277 - () https://vuldb.com/?ctiid.260277 -
References () https://vuldb.com/?id.260277 - () https://vuldb.com/?id.260277 -
References () https://vuldb.com/?submit.312832 - () https://vuldb.com/?submit.312832 -

11 Apr 2024, 12:47

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en SourceCodester Kortex Lite Advocate Office Management System 1.0. Ha sido clasificada como crítica. Esto afecta a una parte desconocida del archivo /control/register_case.php. La manipulación del argumento title/case_no/client_name/court/case_type/case_stage/legel_acts/description/filling_date/hearing_date/opposite_lawyer/total_fees/unpaid conduce a la inyección de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-260277.

11 Apr 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-11 04:15

Updated : 2025-01-30 14:40


NVD link : CVE-2024-3621

Mitre link : CVE-2024-3621

CVE.ORG link : CVE-2024-3621


JSON object : View

Products Affected

mayurik

  • advocate_office_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')