PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to SQL injection, as demonstrated by the email parameter in index.php or register.php. The SQL injection allows to dump the MySQL database and to bypass the login prompt.
References
Link | Resource |
---|---|
https://frostylabs.net/writeups/cve-2020-10106/ | Exploit Third Party Advisory |
https://frostylabs.net/writeups/cve-2020-10106/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://frostylabs.net/writeups/cve-2020-10106/ - Exploit, Third Party Advisory |
Information
Published : 2020-03-05 13:15
Updated : 2024-11-21 04:54
NVD link : CVE-2020-10106
Mitre link : CVE-2020-10106
CVE.ORG link : CVE-2020-10106
JSON object : View
Products Affected
phpgurukul
- daily_expense_tracker_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')