CVE-2024-51327

SQL Injection in loginform.php in ProjectWorld's Travel Management System v1.0 allows remote attackers to bypass authentication via SQL Injection in the 'username' and 'password' fields.
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectworlds:travel_management_system:1.0:*:*:*:*:*:*:*

History

06 Nov 2024, 15:02

Type Values Removed Values Added
First Time Projectworlds travel Management System
Projectworlds
References () https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51327%20-%20SQLi%20Auth%20Bypass - () https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51327%20-%20SQLi%20Auth%20Bypass - Exploit, Third Party Advisory
References () https://projectworlds.in/ - () https://projectworlds.in/ - Product
CPE cpe:2.3:a:projectworlds:travel_management_system:1.0:*:*:*:*:*:*:*

05 Nov 2024, 18:35

Type Values Removed Values Added
CWE CWE-89
Summary
  • (es) La inyección SQL en loginform.php en ProjectWorld's Travel Management System v1.0 permite a atacantes remotos eludir la autenticación mediante inyección SQL en los campos 'username' y 'password'.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

04 Nov 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-04 18:15

Updated : 2024-11-06 15:02


NVD link : CVE-2024-51327

Mitre link : CVE-2024-51327

CVE.ORG link : CVE-2024-51327


JSON object : View

Products Affected

projectworlds

  • travel_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')