CVE-2024-13092

A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. This vulnerability affects unknown code of the file /_parse/_call_job/search_ajax.php of the component Job Post Handler. The manipulation of the argument n leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://github.com/UnrealdDei/cve/blob/main/sql9.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.289900 Permissions Required VDB Entry
https://vuldb.com/?id.289900 Third Party Advisory VDB Entry
https://vuldb.com/?submit.472441 Third Party Advisory VDB Entry
https://github.com/UnrealdDei/cve/blob/main/sql9.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-01-02 09:15

Updated : 2025-04-03 14:45


NVD link : CVE-2024-13092

Mitre link : CVE-2024-13092

CVE.ORG link : CVE-2024-13092


JSON object : View

Products Affected

code-projects

  • job_recruitment
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')