A vulnerability has been found in SourceCodester Best House Rental Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /ajax.php?action=update_account. The manipulation of the argument firstname/lastname/email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20update_account%20time-based%20SQL%20Injection%20Vulnerability.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.278212 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.278212 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.411502 | Third Party Advisory VDB Entry |
https://www.sourcecodester.com/ | Product |
Configurations
History
No history.
Information
Published : 2024-09-20 17:15
Updated : 2024-09-27 15:57
NVD link : CVE-2024-9041
Mitre link : CVE-2024-9041
CVE.ORG link : CVE-2024-9041
JSON object : View
Products Affected
mayurik
- best_house_rental_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')