First published: Wed Oct 27 2021(Updated: )
SQL Injection vulnerabilities exist in https://phpgurukul.com News Portal Project 3.1 via the (1) category, (2) subcategory, (3) sucatdescription, and (4) username parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
News Portal Project News Portal | =3.1 | |
PHPGurukul News Portal | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37808 has a high severity due to the existence of SQL Injection vulnerabilities that can be exploited to gain unauthorized access to database information.
To fix CVE-2021-37808, developers should implement prepared statements or parameterized queries to prevent SQL Injection attacks.
CVE-2021-37808 affects the category, subcategory, sucatdescription, and username parameters in the News Portal Project 3.1.
News Portal Project version 3.1 from PHPGurukul is vulnerable to CVE-2021-37808.
Yes, CVE-2021-37808 can potentially lead to data loss or unauthorized data exposure through SQL Injection.