First published: Thu Mar 05 2020(Updated: )
PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to SQL injection, as demonstrated by the email parameter in index.php or register.php. The SQL injection allows to dump the MySQL database and to bypass the login prompt.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Daily Expense Tracker System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this exploit is CVE-2020-10106.
CVE-2020-10106 has a severity rating of 9.8 (Critical).
The affected software is PHPGurukul Daily Expense Tracker System version 1.0.
The SQL injection vulnerability can be exploited by using a specially crafted email parameter in either the index.php or register.php files.
Unfortunately, there are no known fixes or patches available for CVE-2020-10106 at this time. It is recommended to follow best practices in secure coding to mitigate the risk.