First published: Tue May 24 2022(Updated: )
A vulnerability classified as critical was found in Home Clean Services Management System 1.0. This vulnerability affects the file login.php. The manipulation of the argument email with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(2)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. The attack can be initiated remotely but it requires authentication. Exploit details have been disclosed to the public.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Home Clean Services Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1839 is classified as a critical vulnerability.
CVE-2022-1839 affects the login.php file, allowing SQL injection through the email parameter.
CVE-2022-1839 facilitates SQL injection attacks that can compromise the application's database.
CVE-2022-1839 impacts version 1.0 of the Home Clean Services Management System.
To mitigate CVE-2022-1839, update the Home Clean Services Management System to a secure version that addresses this vulnerability.