code-projects Online Faculty Clearance HTTP GET Request delete_faculty.php sql injection
CVE-2024-0464
Key Information:
- Vendor
- code-projects
- Status
- Vendor
- CVE Published:
- 12 January 2024
Badges
Summary
A significant vulnerability has been identified in the Online Faculty Clearance application by Code-Projects. Specifically, the issue resides within the delete_faculty.php file related to HTTP GET Request handling. This vulnerability arises from improper handling of input parameters, particularly the 'id' argument, which opens the door to SQL injection attacks. By manipulating this argument, attackers can execute unauthorized SQL commands, potentially accessing, modifying, or deleting sensitive data within the database. The alert regarding this exploit has been made public, posing substantial risk to organizations utilizing this software, as it allows for remote exploitation without the need for local access.
Affected Version(s)
Online Faculty Clearance 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved