Projectworlds Visitor Management System in PHP 1.0 allows SQL Injection. The file front.php does not perform input validation on the 'rid' parameter. An attacker can append SQL queries to the input to extract sensitive information from the database.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Sep/43 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/159262/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/author/15149/ | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/159637/Visitor-Management-System-In-PHP-1.0-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-09-30 11:15
Updated : 2022-01-01 10:40
NVD link : CVE-2020-25760
Mitre link : CVE-2020-25760
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
projectworlds
- visitor_management_system_in_php