SQL Injection Vulnerability in Online Shopping Portal Project v3.1 by PHP Gurukul
CVE-2023-37772
8.8HIGH
Summary
An SQL injection vulnerability has been identified in version 3.1 of the Online Shopping Portal Project by PHP Gurukul. This flaw occurs through the Email parameter within the /shopping/login.php endpoint, allowing unauthorized users to manipulate database queries. Exploiting this vulnerability could potentially lead to the exposure of sensitive information or unauthorized access to backend databases, threatening the integrity and confidentiality of user data.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database0 Proof of Concept(s)