SQL Injection Vulnerability in romadebrian WEB-Sekolah Mail Handler
CVE-2024-10841

8HIGH

Key Information:

Vendor
Romadebrian
Status
Web-sekolah
Vendor
CVE Published:
5 November 2024

Badges

👾 Exploit Exists

Summary

A significant security vulnerability has been identified in the romadebrian WEB-Sekolah version 1.0. This issue resides within the Mail Handler component, specifically in the file /Proses_Kirim.php. The vulnerability enables malicious actors to execute SQL injection attacks by manipulating the 'Name' parameter. Given that this exploit can be conducted remotely, it poses a substantial risk to the integrity and confidentiality of the application’s database. Security professionals must address this vulnerability promptly as public disclosure has occurred, leading to potential exploitation by threat actors. Additional parameters within the application may also be vulnerable, urging an immediate security audit.

Affected Version(s)

WEB-Sekolah 1.0

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.