CVE-2024-10335

A vulnerability was found in SourceCodester Garbage Collection Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "username" to be affected. But it must be assumed that the parameter "password" is affected as well.
References
Link Resource
https://github.com/tang-0717/VUL/blob/main/Garbage-Collection-Management-System-01.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.281680 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.281680 Third Party Advisory VDB Entry
https://vuldb.com/?submit.427439 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:sadat:garbage_collection_management_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-10-24 17:15

Updated : 2024-10-28 15:58


NVD link : CVE-2024-10335

Mitre link : CVE-2024-10335

CVE.ORG link : CVE-2024-10335


JSON object : View

Products Affected

sadat

  • garbage_collection_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')