CVE-2024-7797

HIGH

Oretnom23 Simple Online Bidding System - SQL Injection

Title source: rule
STIX 2.1

Description

A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. Affected is an unknown function of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=login. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

References (4)

Core 4
Core References
Permissions Required, Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.274650
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.274650
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.390290

Scores

CVSS v3 7.3
EPSS 0.0019
EPSS Percentile 41.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (1)
oretnom23/simple_online_bidding_system 1.0
Published Aug 15, 2024
Tracked Since Feb 18, 2026