First published: Fri Sep 29 2023(Updated: )
A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. This affects an unknown part of the file edit_parcel.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-240885 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mayuri K Best Courier Management System | =1.0 | |
Mayurik Best Courier Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5272 is high with a CVSS score of 8.8.
The affected software of CVE-2023-5272 is SourceCodester Best Courier Management System 1.0.
The CWE ID of CVE-2023-5272 is CWE-89.
CVE-2023-5272 allows SQL injection through the id parameter in the file edit_parcel.php of the Best Courier Management System 1.0.
Currently, there is no known fix available for CVE-2023-5272. It is recommended to follow the vendor's advisory for any updates or patches.