SQL Injection Vulnerability in SourceCodester E-Commerce System

CVE-2024-8087

9.8CRITICAL

Key Information

Vendor
Sourcecodester
Status
E-commerce System
Vendor
CVE Published:
22 August 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A critical SQL injection vulnerability has been identified in the SourceCodester E-Commerce System version 1.0, specifically within the processing logic of the /ecommerce/popup_Item.php file. This vulnerability allows an attacker to manipulate the 'id' parameter, potentially enabling unauthorized access to database queries and the execution of arbitrary SQL commands. Being remote in nature, this vulnerability poses a significant risk as it can be exploited from outside the network, making it imperative for organizations using affected versions to implement immediate security measures to safeguard sensitive data and maintain system integrity.

Affected Version(s)

E-Commerce System = 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

fany (VulDB User)
.