Authorization Bypass in SourceCodester Employee Task Management System
CVE-2024-2575

7.3HIGH

Key Information:

Vendor
CVE Published:
18 March 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A serious vulnerability has been identified within the SourceCodester Employee Task Management System 1.0 that affects the functionality of the /task-details.php file. The flaw allows attackers to bypass authorization controls by manipulating the task_id parameter. This exploitation can be carried out remotely, posing significant security risks to environments utilizing the affected version of the product. The vulnerability has been publicly disclosed, increasing the chances of malicious exploitation. It is crucial for users and administrators of the Employee Task Management System to implement security measures and updates to mitigate potential risks associated with this vulnerability. For further technical insights and remediation strategies, refer to the detailed reports available on vulnerability databases.

Affected Version(s)

Employee Task Management System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Joshua Lictan
nochizplz (VulDB User)
nochizplz (VulDB User)
.