A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=login2. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/Wsstiger/cve/blob/main/Sourcecoster_sql2.md | Exploit |
https://vuldb.com/?ctiid.274651 | Permissions Required VDB Entry |
https://vuldb.com/?id.274651 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?submit.390297 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-08-15 00:15
Updated : 2024-08-19 16:42
NVD link : CVE-2024-7798
Mitre link : CVE-2024-7798
CVE.ORG link : CVE-2024-7798
JSON object : View
Products Affected
oretnom23
- simple_online_bidding_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')