CVE-2024-6967

A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been classified as critical. This affects an unknown part of the file /employee_gatepass/admin/?page=employee/manage_employee. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272121 was assigned to this vulnerability.
References
Link Resource
https://github.com/rtsjx-cve/cve/blob/main/sql.md Exploit
https://vuldb.com/?ctiid.272121 Permissions Required
https://vuldb.com/?id.272121 Permissions Required Third Party Advisory
https://vuldb.com/?submit.378101 Third Party Advisory
https://github.com/rtsjx-cve/cve/blob/main/sql.md Exploit
https://vuldb.com/?ctiid.272121 Permissions Required
https://vuldb.com/?id.272121 Permissions Required Third Party Advisory
https://vuldb.com/?submit.378101 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:50

Type Values Removed Values Added
References () https://github.com/rtsjx-cve/cve/blob/main/sql.md - Exploit () https://github.com/rtsjx-cve/cve/blob/main/sql.md - Exploit
References () https://vuldb.com/?ctiid.272121 - Permissions Required () https://vuldb.com/?ctiid.272121 - Permissions Required
References () https://vuldb.com/?id.272121 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.272121 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?submit.378101 - Third Party Advisory () https://vuldb.com/?submit.378101 - Third Party Advisory
CVSS v2 : 6.5
v3 : 7.5
v2 : 6.5
v3 : 6.3

07 Sep 2024, 12:56

Type Values Removed Values Added
First Time Oretnom23
Oretnom23 employee And Visitor Gate Pass Logging System
CPE cpe:2.3:a:employee_and_visitor_gate_pass_logging_system_project:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:* cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*

25 Jul 2024, 15:42

Type Values Removed Values Added
First Time Employee And Visitor Gate Pass Logging System Project
Employee And Visitor Gate Pass Logging System Project employee And Visitor Gate Pass Logging System
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 7.5
CPE cpe:2.3:a:employee_and_visitor_gate_pass_logging_system_project:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*
References () https://github.com/rtsjx-cve/cve/blob/main/sql.md - () https://github.com/rtsjx-cve/cve/blob/main/sql.md - Exploit
References () https://vuldb.com/?ctiid.272121 - () https://vuldb.com/?ctiid.272121 - Permissions Required
References () https://vuldb.com/?id.272121 - () https://vuldb.com/?id.272121 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?submit.378101 - () https://vuldb.com/?submit.378101 - Third Party Advisory

22 Jul 2024, 13:00

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Ha sido clasificada como crítica. Esto afecta a una parte desconocida del archivo /employee_gatepass/admin/?page=employee/manage_employee. La manipulación del argumento id conduce a la inyección de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-272121.

22 Jul 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-22 03:15

Updated : 2024-11-21 09:50


NVD link : CVE-2024-6967

Mitre link : CVE-2024-6967

CVE.ORG link : CVE-2024-6967


JSON object : View

Products Affected

oretnom23

  • employee_and_visitor_gate_pass_logging_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')