First published: Wed Dec 11 2024(Updated: )
A vulnerability classified as critical has been found in 1000 Projects Attendance Tracking Management System 1.0. Affected is an unknown function of the file /admin/check_admin_login.php. The manipulation of the argument admin_user_name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
1000projects Attendance Tracking Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12497 is classified as a critical vulnerability.
CVE-2024-12497 affects the /admin/check_admin_login.php file and allows SQL injection through the admin_user_name parameter.
Exploiting CVE-2024-12497 can lead to unauthorized access to the database and sensitive data exposure.
To fix CVE-2024-12497, sanitize and validate the input for the admin_user_name parameter to prevent SQL injection.
As of now, there is no official patch available for CVE-2024-12497, so implementing input validation is crucial.