A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username/mobileno leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_admin_password_recovery_sqli.md | Exploit Third Party Advisory |
https://phpgurukul.com/ | Product |
https://vuldb.com/?ctiid.280943 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.280943 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.425399 | Third Party Advisory VDB Entry |
Configurations
History
03 Apr 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 | |
Summary | (en) A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username/mobileno leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
Information
Published : 2024-10-19 23:15
Updated : 2025-04-03 07:15
NVD link : CVE-2024-10157
Mitre link : CVE-2024-10157
CVE.ORG link : CVE-2024-10157
JSON object : View
Products Affected
phpgurukul
- boat_booking_system