CVE-2020-10106

PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to SQL injection, as demonstrated by the email parameter in index.php or register.php. The SQL injection allows to dump the MySQL database and to bypass the login prompt.
References
Link Resource
https://frostylabs.net/writeups/cve-2020-10106/ Exploit Third Party Advisory
https://frostylabs.net/writeups/cve-2020-10106/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpgurukul:daily_expense_tracker_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:54

Type Values Removed Values Added
References () https://frostylabs.net/writeups/cve-2020-10106/ - Exploit, Third Party Advisory () https://frostylabs.net/writeups/cve-2020-10106/ - Exploit, Third Party Advisory

Information

Published : 2020-03-05 13:15

Updated : 2024-11-21 04:54


NVD link : CVE-2020-10106

Mitre link : CVE-2020-10106

CVE.ORG link : CVE-2020-10106


JSON object : View

Products Affected

phpgurukul

  • daily_expense_tracker_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')