SQL Injection Vulnerability in Pharmacy Management System by Code-Projects
CVE-2024-8147

8.8HIGH

Key Information:

Vendor
CVE Published:
25 August 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A serious security vulnerability has been identified within the Pharmacy Management System version 1.0 developed by Code-Projects. This vulnerability arises from improper handling of input parameters in the file /index.php, specifically the 'action' parameter when editing pharmacist records. An attacker can exploit this flaw by manipulating the 'id' parameter, potentially gaining unauthorized access to sensitive database information through SQL injection techniques. Due to its remote exploitable nature, the risk is significant, making it essential for users of this application to take immediate steps to patch the vulnerability and protect their systems from potential exploit attempts. As this vulnerability has been publicized, heightened vigilance and prompt remediation actions are advised.

Affected Version(s)

Pharmacy Management System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

mqn123 (VulDB User)
.