Execution After Redirect Vulnerability in SourceCodester Employee Task Management System
CVE-2024-2571

9.8CRITICAL

Key Information:

Vendor
CVE Published:
18 March 2024

Badges

👾 Exploit Exists

What is CVE-2024-2571?

A significant vulnerability has been discovered in the SourceCodester Employee Task Management System 1.0. This issue resides within the /manage-admin.php file, allowing for execution after a redirect. Malicious actors can exploit this flaw remotely, leading to unauthorized execution of potentially harmful code. The exploit has been publicly disclosed, increasing the urgency for users to adopt protective measures. Users of the affected software should prioritize updates and consult security advisories to mitigate risks associated with this vulnerability.

Affected Version(s)

Employee Task Management System 1.0

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Joshua Lictan
nochizplz (VulDB User)
nochizplz (VulDB User)
.
CVE-2024-2571 : Execution After Redirect Vulnerability in SourceCodester Employee Task Management System