CVE-2024-7222

A vulnerability, which was classified as critical, was found in SourceCodester Lot Reservation Management System 1.0. Affected is an unknown function of the file /home.php. The manipulation of the argument type leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272802 is the identifier assigned to this vulnerability.
References
Link Resource
https://gist.github.com/topsky979/9f3d490a2bfdb5794dffc2f4aed72250 Exploit Third Party Advisory
https://vuldb.com/?ctiid.272802 Permissions Required Third Party Advisory
https://vuldb.com/?id.272802 Third Party Advisory
https://vuldb.com/?submit.380469 Issue Tracking Third Party Advisory
https://gist.github.com/topsky979/9f3d490a2bfdb5794dffc2f4aed72250 Exploit Third Party Advisory
https://vuldb.com/?ctiid.272802 Permissions Required Third Party Advisory
https://vuldb.com/?id.272802 Third Party Advisory
https://vuldb.com/?submit.380469 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:51

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 9.8
v2 : 6.5
v3 : 6.3
References () https://gist.github.com/topsky979/9f3d490a2bfdb5794dffc2f4aed72250 - Exploit, Third Party Advisory () https://gist.github.com/topsky979/9f3d490a2bfdb5794dffc2f4aed72250 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.272802 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.272802 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.272802 - Third Party Advisory () https://vuldb.com/?id.272802 - Third Party Advisory
References () https://vuldb.com/?submit.380469 - Issue Tracking, Third Party Advisory () https://vuldb.com/?submit.380469 - Issue Tracking, Third Party Advisory

23 Aug 2024, 14:05

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8
References () https://gist.github.com/topsky979/9f3d490a2bfdb5794dffc2f4aed72250 - () https://gist.github.com/topsky979/9f3d490a2bfdb5794dffc2f4aed72250 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.272802 - () https://vuldb.com/?ctiid.272802 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.272802 - () https://vuldb.com/?id.272802 - Third Party Advisory
References () https://vuldb.com/?submit.380469 - () https://vuldb.com/?submit.380469 - Issue Tracking, Third Party Advisory
First Time Oretnom23 lot Reservation Management System
Oretnom23
CPE cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en SourceCodester Lot Reservation Management System 1.0 y clasificada como crítica. Una función desconocida del archivo /home.php es afectada por esta vulnerabilidad. La manipulación del argumento type conduce a la inyección de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-272802 es el identificador asignado a esta vulnerabilidad.

30 Jul 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 07:15

Updated : 2024-11-21 09:51


NVD link : CVE-2024-7222

Mitre link : CVE-2024-7222

CVE.ORG link : CVE-2024-7222


JSON object : View

Products Affected

oretnom23

  • lot_reservation_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')