Critical SQL Injection Vulnerability in PHPGurukul Online Shopping Portal 2.0
CVE-2024-9326
9.8CRITICAL
Key Information
- Vendor
- PHPgurukul
- Status
- Online Shopping Portal
- Vendor
- CVE Published:
- 29 September 2024
Badges
👾 Exploit Exists🔴 Public PoC
Summary
A vulnerability classified as critical was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /shopping/admin/index.php of the component Admin Panel. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Affected Version(s)
Online Shopping Portal = 2.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit exists.
Risk change from: null to: 7.3 - (HIGH)
Vulnerability published.
VulDB entry last update
Vulnerability Reserved.
VulDB entry created
Advisory disclosed
Collectors
NVD DatabaseMitre Database1 Proof of Concept(s)
Credit
SeaWind (VulDB User)