First published: Mon Dec 30 2024(Updated: )
A vulnerability was found in code-projects Simple Chat System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /add_user.php. The manipulation of the argument name/email/password/number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Chat System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13039 has been rated as critical due to its potential for SQL injection.
To fix CVE-2024-13039, ensure input validation and use prepared statements to safeguard against SQL injection.
CVE-2024-13039 affects the /add_user.php file in the Simple Chat System.
The potential impacts of CVE-2024-13039 include unauthorized access and manipulation of the database.
CVE-2024-13039 specifically affects version 1.0 of the Simple Chat System.