A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "mobilenumber" to be affected. But it must be assumed that other parameters are affected as well.
History

Mon, 21 Oct 2024 22:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:boat_booking_system:1.0:*:*:*:*:*:*:*

Mon, 21 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul boat Booking System
CPEs cpe:2.3:a:phpgurukul:boat_booking_system:*:*:*:*:*:*:*:*
Vendors & Products Phpgurukul
Phpgurukul boat Booking System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 20 Oct 2024 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "mobilenumber" to be affected. But it must be assumed that other parameters are affected as well.
Title PHPGurukul Boat Booking System Edit Subdomain Details Page edit-subadmin.php sql injection
Weaknesses CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-20T01:00:08.694Z

Updated: 2024-10-21T20:05:34.685Z

Reserved: 2024-10-18T19:16:58.346Z

Link: CVE-2024-10162

cve-icon Vulnrichment

Updated: 2024-10-21T20:05:28.694Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-20T01:15:02.213

Modified: 2024-10-21T21:36:10.470

Link: CVE-2024-10162

cve-icon Redhat

No data.