SQL Injection Vulnerability in SourceCodester Establishment Billing Management System
CVE-2024-7286
Key Information:
- Vendor
- Sourcecodester
- Vendor
- CVE Published:
- 31 July 2024
Badges
Summary
A significant security flaw has been identified in the SourceCodester Establishment Billing Management System 1.0, where a SQL injection vulnerability exists within the login functionality located at /admin/ajax.php?action=login. This vulnerability allows remote attackers to manipulate the username input, potentially leading to unauthorized database access. Such an exploit may allow attackers to view, modify, or delete sensitive data within the database. The publicly disclosed nature of this vulnerability elevates the urgency for users to apply necessary patches or implement mitigation strategies swiftly to safeguard their systems against potential exploit attempts. Users are encouraged to review their system configurations and ensure that adequate security measures are in place to prevent such SQL injection attacks.
Affected Version(s)
Establishment Billing Management System 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved