First published: Fri Oct 07 2022(Updated: )
A vulnerability was found in SourceCodester Web-Based Student Clearance System. It has been classified as critical. Affected is an unknown function of the file /Admin/login.php of the component POST Parameter Handler. The manipulation of the argument txtusername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-210246 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Student Clearance System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3414 is classified as critical due to its potential for SQL injection attacks.
To fix CVE-2022-3414, it is recommended to sanitize and parameterize all user inputs, particularly in the POST parameter handling.
CVE-2022-3414 affects the POST Parameter Handler of the file /Admin/login.php in the SourceCodester Web-Based Student Clearance System.
CVE-2022-3414 can facilitate SQL injection attacks, potentially compromising the application's database.
Currently, the best workaround for CVE-2022-3414 is to implement input validation and limit database privileges for the application.