First published: Fri Jun 09 2023(Updated: )
A vulnerability, which was classified as critical, was found in SourceCodester Lost and Found Information System 1.0. Affected is an unknown function of the file admin\user\manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-231150 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Lost And Found Information System | =1.0 | |
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3176 has a severity rating of 8.8 (high).
To fix the SQL injection vulnerability in admin\user\manage_user.php for CVE-2023-3176, you should validate and sanitize user input, and use prepared statements or parameterized queries when constructing SQL queries.
Yes, CVE-2023-3176 can be exploited remotely.
The affected software for CVE-2023-3176 is Oretnom23 Lost And Found Information System 1.0.
The Common Weakness Enumeration (CWE) ID for CVE-2023-3176 is CWE-89.