We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-0275

Kashipara Food Management System item_edit_submit.php sql injection



Description

EN DE

A vulnerability was found in Kashipara Food Management System up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file item_edit_submit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249830 is the identifier assigned to this vulnerability.

Eine kritische Schwachstelle wurde in Kashipara Food Management System bis 1.0 ausgemacht. Davon betroffen ist unbekannter Code der Datei item_edit_submit.php. Durch das Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2024-01-06 | Published 2024-01-07 | Updated 2024-09-04 | Assigner VulDB


MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P

Problem types

CWE-89 SQL Injection

Product status

1.0
affected

Timeline

2024-01-06:Advisory disclosed
2024-01-06:VulDB entry created
2024-01-06:VulDB entry last update

Credits

SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) analyst

References

vuldb.com/?id.249830 vdb-entry technical-description

vuldb.com/?ctiid.249830 signature permissions-required

github.com/...ent System/Food Management System - vuln 4.pdf exploit

cve.org (CVE-2024-0275)

nvd.nist.gov (CVE-2024-0275)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-0275

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.