SQL Injection Vulnerability in SourceCodester Simple Subscription Website
CVE-2024-3042
Key Information:
- Vendor
- Sourcecodester
- Vendor
- CVE Published:
- 28 March 2024
Badges
Summary
A critical vulnerability has been identified in SourceCodester's Simple Subscription Website, specifically within the file manage_user.php. This flaw arises from improper handling of user input, which creates a potential for SQL injection attacks. By manipulating the parameter 'id', attackers can execute arbitrary SQL queries against the database, potentially leading to unauthorized access to sensitive data, compromised accounts, and wider system exploitation. The vulnerability is exploitable remotely, and code and public disclosure have been made available, increasing the urgency for affected users to implement necessary security measures. To mitigate this risk, it is crucial for users to apply security patches provided by the vendor and conduct a thorough review of security practices surrounding input validation and user data management.
Affected Version(s)
Simple Subscription Website 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved