Execution After Redirect Vulnerability in SourceCodester Employee Task Management System
CVE-2024-2571
Key Information:
- Vendor
- Sourcecodester
- Vendor
- CVE Published:
- 18 March 2024
Badges
Summary
A significant vulnerability has been discovered in the SourceCodester Employee Task Management System 1.0. This issue resides within the /manage-admin.php file, allowing for execution after a redirect. Malicious actors can exploit this flaw remotely, leading to unauthorized execution of potentially harmful code. The exploit has been publicly disclosed, increasing the urgency for users to adopt protective measures. Users of the affected software should prioritize updates and consult security advisories to mitigate risks associated with this vulnerability.
Affected Version(s)
Employee Task Management System 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved