CVE-2023-1352

A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.
References
Link Resource
https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20sql(6).pdf Exploit Third Party Advisory
https://vuldb.com/?ctiid.222851 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.222851 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:design_and_implementation_of_covid-19_directory_on_vaccination_system_project:design_and_implementation_of_covid-19_directory_on_vaccination_system:1.0:*:*:*:*:*:*:*

History

16 Feb 2024, 18:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.1
CWE CWE-89

07 Nov 2023, 04:03

Type Values Removed Values Added
CWE CWE-89

21 Oct 2023, 09:15

Type Values Removed Values Added
CWE CWE-89
Summary A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851. A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.

Information

Published : 2023-03-11 18:15

Updated : 2024-05-17 02:18


NVD link : CVE-2023-1352

Mitre link : CVE-2023-1352

CVE.ORG link : CVE-2023-1352


JSON object : View

Products Affected

design_and_implementation_of_covid-19_directory_on_vaccination_system_project

  • design_and_implementation_of_covid-19_directory_on_vaccination_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')