CVE-2024-9322

A vulnerability was found in code-projects Supply Chain Management 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit_manufacturer.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anisha:supply_chain_management:1.0:*:*:*:*:*:*:*

History

02 Oct 2024, 13:32

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 6.5
v3 : 9.8
First Time Anisha supply Chain Management
Anisha
CPE cpe:2.3:a:anisha:supply_chain_management:1.0:*:*:*:*:*:*:*
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://github.com/mengcehn/CVE/edit/main/Supply-Chain-Management-in-php-sql.md - () https://github.com/mengcehn/CVE/edit/main/Supply-Chain-Management-in-php-sql.md - Permissions Required
References () https://vuldb.com/?ctiid.278826 - () https://vuldb.com/?ctiid.278826 - Permissions Required
References () https://vuldb.com/?id.278826 - () https://vuldb.com/?id.278826 - Third Party Advisory
References () https://vuldb.com/?submit.413337 - () https://vuldb.com/?submit.413337 - Third Party Advisory

30 Sep 2024, 12:45

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en code-projects Supply Chain Management 1.0. Se ha clasificado como crítica. Se ve afectada una función desconocida del archivo /admin/edit_manufacturer.php. La manipulación del argumento id provoca una inyección SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.

29 Sep 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-29 03:15

Updated : 2024-10-02 13:32


NVD link : CVE-2024-9322

Mitre link : CVE-2024-9322

CVE.ORG link : CVE-2024-9322


JSON object : View

Products Affected

anisha

  • supply_chain_management
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')