A vulnerability classified as critical has been found in code-projects Simple Chat System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264537 was assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.264537 | Permissions Required VDB Entry |
| https://vuldb.com/?id.264537 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.335199 | Third Party Advisory VDB Entry |
| https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.264537 | Permissions Required VDB Entry |
| https://vuldb.com/?id.264537 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.335199 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-05-16 09:15
Updated : 2025-02-18 18:38
NVD link : CVE-2024-4972
Mitre link : CVE-2024-4972
CVE.ORG link : CVE-2024-4972
JSON object : View
Products Affected
code-projects
- simple_chat_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
