SourceCodester Online Discussion Forum Site manage_user.php sql injection
CVE-2023-3149

8.8HIGH

Key Information:

Vendor
CVE Published:
7 June 2023

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A SQL injection vulnerability has been identified in the Online Discussion Forum Site version 1.0 by SourceCodester. The vulnerability resides in the 'manage_user.php' file, where improper input validation allows attackers to manipulate the 'id' argument. This can lead to unauthorized SQL commands being executed in the database, potentially exposing sensitive data or allowing remote attackers to gain administrative access. The exploit has been publicly disclosed, making it crucial for users and administrators to apply necessary security measures to mitigate the risk.

Affected Version(s)

Online Discussion Forum Site 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

peanut886886 (VulDB User)
.
CVE-2023-3149 : SourceCodester Online Discussion Forum Site manage_user.php sql injection | SecurityVulnerability.io