SQL Injection Vulnerability in SourceCodester Online Courseware Software
CVE-2024-3421

9.8CRITICAL

Key Information:

Vendor
CVE Published:
7 April 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant SQL injection vulnerability has been discovered in SourceCodester Online Courseware version 1.0, specifically within the admin/deactivatestud.php file. This vulnerability allows attackers to manipulate the argument selector and execute arbitrary SQL queries on the database. The exploitation of this flaw can be performed remotely, posing serious security risks to the affected application. As public knowledge of this vulnerability has already spread, immediate action is advised for users of this software to implement appropriate security measures and prevent potential exploitation. For further details, users are encouraged to refer to security advisories and technical descriptions available online.

Affected Version(s)

Online Courseware 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

liuann (VulDB User)
.