CVE-2024-10990

A vulnerability classified as critical was found in SourceCodester Online Veterinary Appointment System 1.0. This vulnerability affects unknown code of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/AspirePig/Cve_report/blob/main/online-veterinary-appointment-system/SQLi-1.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.283456 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.283456 Third Party Advisory VDB Entry
https://vuldb.com/?submit.437383 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:online_veterinary_appointment_system:1.0:*:*:*:*:*:*:*

History

18 Nov 2024, 18:42

Type Values Removed Values Added
First Time Oretnom23
Oretnom23 online Veterinary Appointment System
CPE cpe:2.3:a:oretnom23:online_veterinary_appointment_system:1.0:*:*:*:*:*:*:*
References () https://github.com/AspirePig/Cve_report/blob/main/online-veterinary-appointment-system/SQLi-1.md - () https://github.com/AspirePig/Cve_report/blob/main/online-veterinary-appointment-system/SQLi-1.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.283456 - () https://vuldb.com/?ctiid.283456 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.283456 - () https://vuldb.com/?id.283456 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.437383 - () https://vuldb.com/?submit.437383 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 8.8

08 Nov 2024, 19:01

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como crítica en SourceCodester Online Veterinary Appointment System 1.0. Esta vulnerabilidad afecta al código desconocido del archivo /admin/services/view_service.php. La manipulación del argumento id conduce a una inyección SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse.

08 Nov 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-08 05:15

Updated : 2024-11-18 18:42


NVD link : CVE-2024-10990

Mitre link : CVE-2024-10990

CVE.ORG link : CVE-2024-10990


JSON object : View

Products Affected

oretnom23

  • online_veterinary_appointment_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')