First published: Wed Dec 01 2021(Updated: )
SQL Injection vulnerability exists in PHPGURUKUL Employee Record Management System 1.2 via the Email POST parameter in /forgetpassword.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGURUKUL Employee Record Management System | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-43451 is critical with a CVSS score of 9.8.
SQL injection occurs in PHPGURUKUL Employee Record Management System 1.2 via the Email POST parameter in /forgetpassword.php.
To fix the SQL injection vulnerability in PHPGURUKUL Employee Record Management System 1.2, you should sanitize and validate user input, and use prepared statements or parameterized queries instead of concatenating user input into SQL queries.
The Common Weakness Enumeration (CWE) ID for CVE-2021-43451 is CWE-89.
You can find more information about CVE-2021-43451 at the following references: [Link 1](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PHPGURUKUL/ANUJ%20KUMAR/Employee-Record-Management-System-SQL-Injection), [Link 2](https://www.exploit-db.com/exploits/50467), [Link 3](https://www.nu11secur1ty.com/2021/12/cve-2021-43451.html).