SQL Injection Vulnerability in Project Worlds Online Time Table Generator
CVE-2024-10446

7.2HIGH

Key Information:

Vendor
Project Worlds
Status
Online Time Table Generator
Vendor
CVE Published:
28 October 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A serious security flaw exists in the Project Worlds Online Time Table Generator version 1.0, specifically affecting an unspecified function in the admin dashboard. The vulnerability arises from improper validation of the 'c' argument within the URL endpoint '/timetable/admin/admindashboard.php?info=add_course', leading to potential SQL injection attacks. Attackers can exploit this vulnerability remotely, allowing them to manipulate database queries and gain unauthorized access to sensitive information. With public exploits already disclosed, it is crucial for users to apply the necessary security patches to mitigate risks associated with this vulnerability.

Affected Version(s)

Online Time Table Generator 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

jadu101 (VulDB User)
.