A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.
References
Link | Resource |
---|---|
https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20sql(6).pdf | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.222851 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.222851 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-03-11 10:15
Updated : 2023-03-15 10:37
NVD link : CVE-2023-1352
Mitre link : CVE-2023-1352
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
design_and_implementation_of_covid-19_directory_on_vaccination_system_project
- design_and_implementation_of_covid-19_directory_on_vaccination_system