CVE-2024-57687

An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "Cookie" GET request parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*

History

28 Mar 2025, 19:16

Type Values Removed Values Added
References () https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/Command%20Injection.pdf - () https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/Command%20Injection.pdf - Exploit, Third Party Advisory
Summary
  • (es) Se encontró una vulnerabilidad de inyección de comandos del sistema operativo en /landrecordsys/admin/dashboard.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar código arbitrario a través del parámetro de solicitud GET "Cookie".
CPE cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*
First Time Phpgurukul land Record System
Phpgurukul

10 Jan 2025, 16:15

Type Values Removed Values Added
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

10 Jan 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-10 14:15

Updated : 2025-03-28 19:16


NVD link : CVE-2024-57687

Mitre link : CVE-2024-57687

CVE.ORG link : CVE-2024-57687


JSON object : View

Products Affected

phpgurukul

  • land_record_system
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')