SQL Injection Vulnerability in PayPal Payment
CVE-2024-33972
7.5HIGH
Summary
A SQL injection vulnerability exists in PayPal's Credit Card and Debit Card Payment systems, specifically affecting version 1.0. This vulnerability allows an attacker to submit a crafted SQL query via the 'events' parameter in the '/report/event_print.php' URL. If successfully exploited, this could permit the attacker to gain unauthorized access to sensitive information stored in the database, posing a significant risk to both user data and overall system integrity. Immediate action is recommended to mitigate potential threats associated with this vulnerability.
Affected Version(s)
chool Event Management System 1.0
School Attendance Monitoring System 1.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Rafael Pedrero