SQL Injection Vulnerability in romadebrian WEB-Sekolah Mail Handler

CVE-2024-10841

8HIGH

Key Information

Vendor
Romadebrian
Status
Web-sekolah
Vendor
CVE Published:
5 November 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant security vulnerability has been identified in the romadebrian WEB-Sekolah version 1.0. This issue resides within the Mail Handler component, specifically in the file /Proses_Kirim.php. The vulnerability enables malicious actors to execute SQL injection attacks by manipulating the 'Name' parameter. Given that this exploit can be conducted remotely, it poses a substantial risk to the integrity and confidentiality of the application’s database. Security professionals must address this vulnerability promptly as public disclosure has occurred, leading to potential exploitation by threat actors. Additional parameters within the application may also be vulnerable, urging an immediate security audit.

Affected Version(s)

WEB-Sekolah = 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • Vulnerability Reserved

  • 👾

    Exploit known to exist

  • Vulnerability published

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)
.