SQL Injection Vulnerability in SourceCodester Prison Management System
CVE-2024-3439

7.3HIGH

Key Information:

Vendor
CVE Published:
8 April 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A prominent SQL injection vulnerability was identified in the login function of the SourceCodester Prison Management System version 1.0. This security flaw allows attackers to execute arbitrary SQL queries, potentially leading to unauthorized access and manipulation of the underlying database. The vulnerability is particularly concerning because it can be exploited remotely, meaning that an attacker does not need physical access to the system to execute their malicious actions. With the exploit publicly disclosed, it poses a significant risk to the security and integrity of data managed by the Prison Management System. Organizations using this software must act swiftly to patch their systems and mitigate potential attacks.

Affected Version(s)

Prison Management System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LI YU (VulDB User)
.