First published: Tue May 24 2022(Updated: )
A vulnerability classified as critical has been found in Home Clean Services Management System 1.0. This affects an unknown part of admin/login.php. The manipulation of the argument username with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(5)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. It is possible to initiate the attack remotely but it requires authentication. Exploit details have been disclosed to the public.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Home Clean Services Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-1838 is classified as critical.
To fix CVE-2022-1838, you should update the Home Clean Services Management System to the latest version that patches the vulnerability.
The impact of CVE-2022-1838 allows attackers to execute SQL injection, potentially leading to unauthorized access to the system.
CVE-2022-1838 affects version 1.0 of the Home Clean Services Management System.
The vulnerability is located in the admin/login.php file of the Home Clean Services Management System.