SourceCodester Best Courier Management System GET Parameter edit_parcel.php sql injection
CVE-2023-5272
8.8HIGH
Summary
A SQL injection vulnerability has been identified in the SourceCodester Best Courier Management System version 1.0. This issue specifically affects the edit_parcel.php file within the GET Parameter Handler component. By manipulating the 'id' parameter, attackers can execute arbitrary SQL commands, potentially compromising the database's integrity and confidentiality. This exploit is publicly known, emphasizing the need for immediate action to secure this application against unauthorized database access.
Affected Version(s)
Best Courier Management System 1.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)