CVE-2024-6902

A vulnerability classified as critical was found in SourceCodester Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file sort_user.php. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271927.
References
Link Resource
https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-05.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.271927 Permissions Required VDB Entry
https://vuldb.com/?id.271927 Third Party Advisory VDB Entry
https://vuldb.com/?submit.375195 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*

History

24 Jul 2024, 16:55

Type Values Removed Values Added
First Time Jkev record Management System
CPE cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:* cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.271927 - Permissions Required () https://vuldb.com/?ctiid.271927 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.271927 - Third Party Advisory () https://vuldb.com/?id.271927 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.375195 - Third Party Advisory () https://vuldb.com/?submit.375195 - Third Party Advisory, VDB Entry
Summary
  • (es) Una vulnerabilidad fue encontrada en SourceCodester Record Management System 1.0 y clasificada como crítica. Una función desconocida del archivo sort_user.php es afectada por esta vulnerabilidad. La manipulación del argumento sort conduce a la inyección de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-271927.

19 Jul 2024, 19:10

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 8.8
CPE cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*
References () https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-05.md - () https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-05.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.271927 - () https://vuldb.com/?ctiid.271927 - Permissions Required
References () https://vuldb.com/?id.271927 - () https://vuldb.com/?id.271927 - Third Party Advisory
References () https://vuldb.com/?submit.375195 - () https://vuldb.com/?submit.375195 - Third Party Advisory
First Time Jkev
Jkev record Managment System

19 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-19 08:15

Updated : 2024-07-24 16:55


NVD link : CVE-2024-6902

Mitre link : CVE-2024-6902

CVE.ORG link : CVE-2024-6902


JSON object : View

Products Affected

jkev

  • record_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')