First published: Wed May 05 2021(Updated: )
SQL Injection vulnerability in Online Book Store v1.0 via the publisher parameter to edit_book.php, which could let a remote malicious user execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Book Store Project In Php | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of vulnerability CVE-2020-19114 is critical with a score of 9.8.
Vulnerability CVE-2020-19114 in the publisher parameter of the edit_book.php page could allow a remote malicious user to execute arbitrary code on the Online Book Store v1.0.
To fix vulnerability CVE-2020-19114, it is recommended to sanitize and validate user input in the publisher parameter of the edit_book.php page to prevent SQL injection attacks.
No known exploit for vulnerability CVE-2020-19114 has been reported at this time.
More information about vulnerability CVE-2020-19114 can be found in the GitHub issue #8 of the Projectworlds Online Book Store Project in PHP repository.