SQL Injection Vulnerability in SourceCodester Simple Subscription Website
CVE-2024-3042

6.3MEDIUM

Key Information:

Vendor
CVE Published:
28 March 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A critical vulnerability has been identified in SourceCodester's Simple Subscription Website, specifically within the file manage_user.php. This flaw arises from improper handling of user input, which creates a potential for SQL injection attacks. By manipulating the parameter 'id', attackers can execute arbitrary SQL queries against the database, potentially leading to unauthorized access to sensitive data, compromised accounts, and wider system exploitation. The vulnerability is exploitable remotely, and code and public disclosure have been made available, increasing the urgency for affected users to implement necessary security measures. To mitigate this risk, it is crucial for users to apply security patches provided by the vendor and conduct a thorough review of security practices surrounding input validation and user data management.

Affected Version(s)

Simple Subscription Website 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

shaozhenghao666 (VulDB User)
.