SQL Injection Vulnerability in SourceCodester Simple Realtime Quiz System
CVE-2024-7376
9.8CRITICAL
Summary
A significant SQL injection vulnerability has been discovered in SourceCodester's Simple Realtime Quiz System version 1.0, specifically affecting the functionality within the script located at /print_quiz_records.php. This flaw allows attackers to manipulate input parameters—in this case, the 'id' argument—resulting in unauthorized database queries. Exploiting this vulnerability can enable a remote attacker to gain access to sensitive data, potentially compromising the application's integrity. Given that the details of this exploit are publicly available, organizations using this software are urged to apply security measures to mitigate the risk of an attack.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published