CVE-2024-6213

A vulnerability was found in SourceCodester Food Ordering Management System up to 1.0. It has been classified as critical. This affects an unknown part of the file login.php of the component Login Panel. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269277 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:49

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.3
References () https://github.com/jadu101/CVE/blob/main/SourceCodester_Food_Ordering_Management_System_Sqli.md - Exploit () https://github.com/jadu101/CVE/blob/main/SourceCodester_Food_Ordering_Management_System_Sqli.md - Exploit
References () https://vuldb.com/?ctiid.269277 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.269277 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.269277 - Third Party Advisory () https://vuldb.com/?id.269277 - Third Party Advisory
References () https://vuldb.com/?submit.359574 - Third Party Advisory () https://vuldb.com/?submit.359574 - Third Party Advisory

23 Aug 2024, 02:14

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en SourceCodester Food Ordering Management System hasta la versión 1.0. Ha sido clasificada como crítica. Una parte desconocida del archivo login.php del componente Login Panel afecta a una parte desconocida. La manipulación del argumento nombre de usuario conduce a la inyección de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-269277.
CVSS v2 : 7.5
v3 : 7.3
v2 : 7.5
v3 : 9.8
First Time Oretnom23
Oretnom23 food Ordering Management System
References () https://github.com/jadu101/CVE/blob/main/SourceCodester_Food_Ordering_Management_System_Sqli.md - () https://github.com/jadu101/CVE/blob/main/SourceCodester_Food_Ordering_Management_System_Sqli.md - Exploit
References () https://vuldb.com/?ctiid.269277 - () https://vuldb.com/?ctiid.269277 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.269277 - () https://vuldb.com/?id.269277 - Third Party Advisory
References () https://vuldb.com/?submit.359574 - () https://vuldb.com/?submit.359574 - Third Party Advisory
CPE cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*

21 Jun 2024, 01:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 01:16

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6213

Mitre link : CVE-2024-6213

CVE.ORG link : CVE-2024-6213


JSON object : View

Products Affected

oretnom23

  • food_ordering_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')