SQL Injection Vulnerability in SourceCodester Record Management System
CVE-2024-6903

8.8HIGH

Key Information:

Vendor
CVE Published:
19 July 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A serious SQL injection vulnerability has been identified in the SourceCodester Record Management System, specifically within the file sort1_user.php. This flaw arises from improper handling of user-supplied input, which allows an attacker to manipulate the argument position in requests, leading to database query manipulation. This vulnerability could be exploited remotely, providing attackers the ability to execute arbitrary SQL commands. With the exploit now publicly disclosed, it poses a significant risk to unpatched instances of version 1.0 of the product. Organizations using this system must act promptly to assess their exposure and implement necessary patches or mitigations to prevent potential unauthorized access and data breaches.

Affected Version(s)

Record Management System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

netmanzhang (VulDB User)
.