Customer Support System v1 was discovered to contain a SQL injection vulnerability via the subject parameter at /customer_support/ajax.php?action=save_ticket.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/geraldoalcantara/CVE-2023-49970 | Exploit Third Party Advisory | 
| https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html | Product | 
| https://github.com/geraldoalcantara/CVE-2023-49970 | Exploit Third Party Advisory | 
| https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html | Product | 
Configurations
                    History
                    28 Mar 2025, 14:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/geraldoalcantara/CVE-2023-49970 - Exploit, Third Party Advisory | |
| References | () https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html - Product | |
| First Time | Oretnom23 customer Support System Oretnom23 | |
| CPE | cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:* | 
Information
                Published : 2024-03-05 00:15
Updated : 2025-03-28 14:32
NVD link : CVE-2023-49970
Mitre link : CVE-2023-49970
CVE.ORG link : CVE-2023-49970
JSON object : View
Products Affected
                oretnom23
- customer_support_system
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
