First published: Wed Oct 27 2021(Updated: )
An SQL Injection vulneraility exists in https://phpgurukul.com Online Shopping Portal 3.1 via the email parameter on the /check_availability.php endpoint that serves as a checker whether a new user's email is already exist within the database.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Online Shopping Portal Project Online Shopping Portal | =3.1 | |
PHPGurukul Online Shopping Portal | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SQL Injection vulnerability is CVE-2021-37807.
The SQL Injection vulnerability exists in the email parameter on the /check_availability.php endpoint of the Online Shopping Portal 3.1.
An attacker can exploit this SQL Injection vulnerability by injecting malicious SQL code into the email parameter to manipulate the database queries.
The severity of CVE-2021-37807 is high, with a CVSS score of 7.5.
No specific fix information is provided in the vulnerability report. It is recommended to update to a patched version or apply security measures to mitigate the risk.