The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-12-23 06:15
Updated : 2022-01-04 08:49
NVD link : CVE-2021-44600
Mitre link : CVE-2021-44600
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
online_mens_salon_management_system_project
- online_mens_salon_management_system