SQL Injection in loginform.php in ProjectWorld's Travel Management System v1.0 allows remote attackers to bypass authentication via SQL Injection in the 'username' and 'password' fields.
References
Link | Resource |
---|---|
https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51327%20-%20SQLi%20Auth%20Bypass | Exploit Third Party Advisory |
https://projectworlds.in/ | Product |
Configurations
History
06 Nov 2024, 15:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Projectworlds travel Management System
Projectworlds |
|
References | () https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51327%20-%20SQLi%20Auth%20Bypass - Exploit, Third Party Advisory | |
References | () https://projectworlds.in/ - Product | |
CPE | cpe:2.3:a:projectworlds:travel_management_system:1.0:*:*:*:*:*:*:* |
05 Nov 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
04 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-04 18:15
Updated : 2024-11-06 15:02
NVD link : CVE-2024-51327
Mitre link : CVE-2024-51327
CVE.ORG link : CVE-2024-51327
JSON object : View
Products Affected
projectworlds
- travel_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')