A vulnerability has been found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_sqli.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.281983 | Permissions Required VDB Entry |
https://vuldb.com/?id.281983 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.432234 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-10-28 00:15
Updated : 2024-10-30 18:45
NVD link : CVE-2024-10432
Mitre link : CVE-2024-10432
CVE.ORG link : CVE-2024-10432
JSON object : View
Products Affected
projectworlds
- simple_web-based_chat_application
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')