A vulnerability was found in SourceCodester Online Railway Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_details.php. The manipulation of the argument id leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Online-Railway-Registraion-System-BAC.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.278825 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.278825 | Third Party Advisory |
https://vuldb.com/?submit.412491 | Third Party Advisory |
https://www.sourcecodester.com/ | Product |
Configurations
History
01 Oct 2024, 13:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Online-Railway-Registraion-System-BAC.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.278825 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.278825 - Third Party Advisory | |
References | () https://vuldb.com/?submit.412491 - Third Party Advisory | |
References | () https://www.sourcecodester.com/ - Product | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:oretnom23:railway_reservation_system:1.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23
Oretnom23 railway Reservation System |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Sep 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-29 01:15
Updated : 2024-10-01 13:28
NVD link : CVE-2024-9321
Mitre link : CVE-2024-9321
CVE.ORG link : CVE-2024-9321
JSON object : View
Products Affected
oretnom23
- railway_reservation_system
CWE