First published: Sat Jan 28 2023(Updated: )
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219716.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Bank Locker Management System | =1.0 | |
Bank Locker Management System Project Bank Locker Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0562 is critical with a severity value of 9.8.
The affected software of CVE-2023-0562 is PHPGurukul Bank Locker Management System 1.0 and Bank Locker Management System Project Bank Locker Management System 1.0.
The vulnerability in PHPGurukul Bank Locker Management System 1.0 allows SQL injection through the username parameter in index.php.
The SQL injection vulnerability in CVE-2023-0562 can be exploited by manipulating the username parameter in the index.php file.
Yes, you can find references for CVE-2023-0562 at the following links: [https://vuldb.com/?id.219716](https://vuldb.com/?id.219716), [https://vuldb.com/?ctiid.219716](https://vuldb.com/?ctiid.219716), [https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md](https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md)