CVE-2024-7223

A vulnerability has been found in SourceCodester Lot Reservation Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /view_model.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272803.
References
Link Resource
https://gist.github.com/topsky979/4c28743586769e73fe37007ed92cc1a7 Exploit Third Party Advisory
https://vuldb.com/?ctiid.272803 Permissions Required Third Party Advisory
https://vuldb.com/?id.272803 Third Party Advisory
https://vuldb.com/?submit.380470 Issue Tracking Third Party Advisory
https://gist.github.com/topsky979/4c28743586769e73fe37007ed92cc1a7 Exploit Third Party Advisory
https://vuldb.com/?ctiid.272803 Permissions Required Third Party Advisory
https://vuldb.com/?id.272803 Third Party Advisory
https://vuldb.com/?submit.380470 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:51

Type Values Removed Values Added
References () https://gist.github.com/topsky979/4c28743586769e73fe37007ed92cc1a7 - Exploit, Third Party Advisory () https://gist.github.com/topsky979/4c28743586769e73fe37007ed92cc1a7 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.272803 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.272803 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.272803 - Third Party Advisory () https://vuldb.com/?id.272803 - Third Party Advisory
References () https://vuldb.com/?submit.380470 - Issue Tracking, Third Party Advisory () https://vuldb.com/?submit.380470 - Issue Tracking, Third Party Advisory
CVSS v2 : 6.5
v3 : 9.8
v2 : 6.5
v3 : 6.3

23 Aug 2024, 14:05

Type Values Removed Values Added
References () https://gist.github.com/topsky979/4c28743586769e73fe37007ed92cc1a7 - () https://gist.github.com/topsky979/4c28743586769e73fe37007ed92cc1a7 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.272803 - () https://vuldb.com/?ctiid.272803 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.272803 - () https://vuldb.com/?id.272803 - Third Party Advisory
References () https://vuldb.com/?submit.380470 - () https://vuldb.com/?submit.380470 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:oretnom23:lot_reservation_management_system:1.0:*:*:*:*:*:*:*
First Time Oretnom23 lot Reservation Management System
Oretnom23
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en SourceCodester Lot Reservation Management System 1.0 y clasificada como crítica. Una función desconocida del archivo /view_model.php es afectada por esta vulnerabilidad. La manipulación del argumento id conduce a la inyección de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-272803.

30 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 08:15

Updated : 2024-11-21 09:51


NVD link : CVE-2024-7223

Mitre link : CVE-2024-7223

CVE.ORG link : CVE-2024-7223


JSON object : View

Products Affected

oretnom23

  • lot_reservation_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')