CVE-2022-3495

A vulnerability has been found in SourceCodester Simple Online Public Access Catalog 1.0 and classified as critical. This vulnerability affects unknown code of the file /opac/Actions.php?a=login of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210784.
References
Link Resource
https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection/blob/main/POC Exploit Third Party Advisory
https://vuldb.com/?id.210784 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:simple_online_public_access_catalog_project:simple_online_public_access_catalog:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-10-14 07:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-3495

Mitre link : CVE-2022-3495

CVE.ORG link : CVE-2022-3495


JSON object : View

Products Affected

simple_online_public_access_catalog_project

  • simple_online_public_access_catalog
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-707

Improper Neutralization