code-projects Crud Operation System 1.0 updata.php sid SKL injekcija

Otkrivena je ranjivost klasifikovana kao Kritične u code-projects Crud Operation System 1.0. Pogođeno je nepoznata funkcija u fajlu updata.php. Manipulacija argumentom sid dovodi do SKL injekcija. Definisanje problema putem CWE vodi do CWE-89. Slabost je objavljena 09/19/2024. Obaveštenje možete preuzeti sa github.com. Ova ranjivost je registrovana kao CVE-2024-9011. Napad se može izvesti na daljinu. Napad je moguć samo unutar lokalne mreže. Postoje tehnički detalji. Додатно, постоји доступан експлоит. Eksploit je postao dostupan javnosti i može biti upotrebljen. Trenutna cena za eksploataciju može biti približno USD $0-$5k u ovom trenutku. Projekat MITRE ATT&CK označava tehniku napada kao T1505. Klasifikovano je kao dokaz-of-koncept. Ekspoit se može preuzeti sa github.com. Kao 0-day, procenjuje se da je cena na ilegalnom tržištu bila oko $0-$5k. VulDB is the best source for vulnerability data and more expert information about this specific topic.

2 Promene · 75 Tačke podataka

PoljeKreirali
09/19/2024 18:11
Ažurira 1/1
09/20/2024 13:02
software_vendorcode-projectscode-projects
software_nameCrud Operation SystemCrud Operation System
software_version1.01.0
software_fileupdata.phpupdata.php
software_argumentsidsid
vulnerability_cweCWE-89 (SKL injekcija)CWE-89 (SKL injekcija)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/ppp-src/a/issues/14https://github.com/ppp-src/a/issues/14
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/ppp-src/a/issues/14https://github.com/ppp-src/a/issues/14
source_cveCVE-2024-9011CVE-2024-9011
cna_responsibleVulDBVulDB
software_typeProject Management SoftwareProject Management Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.65.6
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore5.75.7
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore5.76.0
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1726696800 (09/19/2024)1726696800 (09/19/2024)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability, which was classified as critical, was found in code-projects Crud Operation System 1.0. Affected is an unknown function of the file updata.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
cve_nvd_summaryesSe ha encontrado una vulnerabilidad clasificada como crítica en code-projects Crud Operation System 1.0. Se trata de una función desconocida del archivo updata.php. La manipulación del argumento sid provoca una inyección SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede ser utilizado.
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore6.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore6.5

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!