code-projects Client Details System HTTP POST Request sql injection
CVE-2023-7137
8.8HIGH
Summary
A significant SQL injection vulnerability exists in the HTTP POST Request Handler component of Code-Projects Client Details System 1.0. This issue allows unauthorized manipulation of the 'uemail' argument, potentially compromising the integrity and confidentiality of data. Publicly disclosed exploits may enable attackers to execute arbitrary SQL commands, leading to unauthorized access or data leakage. It is essential for users and administrators to assess their exposure and apply necessary security measures.
Affected Version(s)
Client Details System 1.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Hamdi Sevben (VulDB User)