SQL Injection Vulnerability in romadebrian WEB-Sekolah Mail Handler
CVE-2024-10841
Key Information
- Vendor
- Romadebrian
- Status
- Web-sekolah
- Vendor
- CVE Published:
- 5 November 2024
Badges
Summary
A significant security vulnerability has been identified in the romadebrian WEB-Sekolah version 1.0. This issue resides within the Mail Handler component, specifically in the file /Proses_Kirim.php. The vulnerability enables malicious actors to execute SQL injection attacks by manipulating the 'Name' parameter. Given that this exploit can be conducted remotely, it poses a substantial risk to the integrity and confidentiality of the application’s database. Security professionals must address this vulnerability promptly as public disclosure has occurred, leading to potential exploitation by threat actors. Additional parameters within the application may also be vulnerable, urging an immediate security audit.
Affected Version(s)
WEB-Sekolah = 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
Vulnerability Reserved
- 👾
Exploit known to exist
Vulnerability published