First published: Sat May 20 2023(Updated: )
A vulnerability was found in SourceCodester Class Scheduling System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_subject.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229597 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Class Scheduling System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2823 is a critical vulnerability found in SourceCodester Class Scheduling System 1.0 that allows SQL injection through the 'id' parameter in the /admin/edit_subject.php file.
CVE-2023-2823 has a severity rating of 9.8, which is considered critical.
The affected software is the Class Scheduling System 1.0 by Class Scheduling System Project.
The SQL injection vulnerability in CVE-2023-2823 can be exploited by manipulating the 'id' parameter in the /admin/edit_subject.php file.
You can find more information about CVE-2023-2823 in the following references: [Reference 1](https://github.com/zhulielie/CVEReport/blob/main/SQL.md), [Reference 2](https://vuldb.com/?ctiid.229597), [Reference 3](https://vuldb.com/?id.229597).