A vulnerability was found in code-projects Simple Car Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file /book_car.php. The manipulation of the argument fname/id_no/gender/email/phone/location leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "fname" to be affected. Further analysis indicates that other arguments might be affected as well.
History

Tue, 26 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Car Rental System
CPEs cpe:2.3:a:code-projects:simple_car_rental_system:1.0:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Car Rental System
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabianros
Fabianros simple Car Rental System
CPEs cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabianros
Fabianros simple Car Rental System

Sat, 23 Nov 2024 13:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Simple Car Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file /book_car.php. The manipulation of the argument fname/id_no/gender/email/phone/location leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "fname" to be affected. Further analysis indicates that other arguments might be affected as well.
Title code-projects Simple Car Rental System book_car.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-23T13:31:03.961Z

Updated: 2024-11-26T16:11:24.862Z

Reserved: 2024-11-22T17:06:44.093Z

Link: CVE-2024-11632

cve-icon Vulnrichment

Updated: 2024-11-26T16:11:16.273Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-23T14:15:17.880

Modified: 2024-11-25T16:50:43.257

Link: CVE-2024-11632

cve-icon Redhat

No data.