We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical was found in PHPGurukul Boat Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/profile.php of the component My Profile Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "mobilenumber" to be affected. But it must be assumed that other parameters are affected as well.
In PHPGurukul Boat Booking System 1.0 wurde eine kritische Schwachstelle entdeckt. Es geht um eine nicht näher bekannte Funktion der Datei /admin/profile.php der Komponente My Profile Page. Mittels dem Manipulieren des Arguments sadminusername/fullname/emailid/mobilenumber mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2024-10-18: | Advisory disclosed |
2024-10-18: | VulDB entry created |
2024-10-18: | VulDB entry last update |
jadu101 (VulDB User)
vuldb.com/?id.280945 (VDB-280945 | PHPGurukul Boat Booking System My Profile Page profile.php sql injection)
vuldb.com/?ctiid.280945 (VDB-280945 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.425434 (Submit #425434 | PHPGurukul Boat Booking System 1.0 SQL Injection)
github.com/...phpgurukul_boat_booking_system_profile_sqli.md
phpgurukul.com/
Support options