A vulnerability has been found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_sqli.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.281983 | Permissions Required VDB Entry |
https://vuldb.com/?id.281983 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.432234 | Third Party Advisory VDB Entry |
Configurations
History
30 Oct 2024, 18:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_sqli.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.281983 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.281983 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.432234 - Third Party Advisory, VDB Entry | |
First Time |
Projectworlds simple Web-based Chat Application
Projectworlds |
|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:a:projectworlds:simple_web-based_chat_application:1.0:*:*:*:*:*:*:* |
28 Oct 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Oct 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-28 00:15
Updated : 2024-10-30 18:45
NVD link : CVE-2024-10432
Mitre link : CVE-2024-10432
CVE.ORG link : CVE-2024-10432
JSON object : View
Products Affected
projectworlds
- simple_web-based_chat_application
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')