First published: Sun Oct 27 2024(Updated: )
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /deleteanimal.php. The manipulation of the argument t1 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "refno" to be affected. But further inspection indicates that the name of the affected parameter is "t1".
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codezips Pet Shop Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10427 has been declared as critical.
CVE-2024-10427 allows for SQL injection through manipulation of the argument t1 in the file /deleteanimal.php.
Yes, the exploit for CVE-2024-10427 can be initiated remotely.
CVE-2024-10427 specifically affects Codezips Pet Shop Management System version 1.0.
To fix CVE-2024-10427, it is recommended to sanitize inputs in the /deleteanimal.php file to prevent SQL injection.