A vulnerability, which was classified as critical, was found in Campcodes Online Examination System 1.0. This affects an unknown part of the file /adminpanel/admin/query/deleteQuestionExe.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258033 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf | Exploit |
https://vuldb.com/?ctiid.258033 | Permissions Required VDB Entry |
https://vuldb.com/?id.258033 | Permissions Required VDB Entry |
https://vuldb.com/?submit.304758 | Third Party Advisory VDB Entry |
https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf | Exploit |
https://vuldb.com/?ctiid.258033 | Permissions Required VDB Entry |
https://vuldb.com/?id.258033 | Permissions Required VDB Entry |
https://vuldb.com/?submit.304758 | Third Party Advisory VDB Entry |
Configurations
History
20 Feb 2025, 18:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:* | |
First Time |
Campcodes
Campcodes online Examination System |
|
References | () https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf - Exploit | |
References | () https://vuldb.com/?ctiid.258033 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.258033 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?submit.304758 - Third Party Advisory, VDB Entry |
Information
Published : 2024-03-27 03:15
Updated : 2025-02-20 18:06
NVD link : CVE-2024-2942
Mitre link : CVE-2024-2942
CVE.ORG link : CVE-2024-2942
JSON object : View
Products Affected
campcodes
- online_examination_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')