CVE-2024-9086

A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument from/to leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "from" to be affected. But it must be assumed that parameter "to" is affected as well.
References
Link Resource
https://code-projects.org/ Product
https://github.com/ppp-src/a/issues/20 Exploit Third Party Advisory
https://vuldb.com/?ctiid.278262 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.278262 Third Party Advisory VDB Entry
https://vuldb.com/?submit.411850 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*

History

26 Sep 2024, 15:26

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8
CPE cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*
First Time Code-projects
Code-projects restaurant Reservation System
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://github.com/ppp-src/a/issues/20 - () https://github.com/ppp-src/a/issues/20 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.278262 - () https://vuldb.com/?ctiid.278262 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.278262 - () https://vuldb.com/?id.278262 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.411850 - () https://vuldb.com/?submit.411850 - Third Party Advisory, VDB Entry

26 Sep 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como crítica en code-projects Restaurant Reservation System 1.0. Se ve afectada una función desconocida del archivo /filter.php. La manipulación del argumento from/to provoca una inyección SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse. El aviso inicial para investigadores solo menciona que el parámetro "from" se verá afectado, pero se debe asumir que el parámetro "to" también se verá afectado.

22 Sep 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-22 21:15

Updated : 2024-09-26 15:26


NVD link : CVE-2024-9086

Mitre link : CVE-2024-9086

CVE.ORG link : CVE-2024-9086


JSON object : View

Products Affected

code-projects

  • restaurant_reservation_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')