First published: Fri Feb 23 2024(Updated: )
A vulnerability was found in code-projects Library System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file Source/librarian/user/student/registration.php. The manipulation of the argument email/regno/phone/username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254617 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
code-projects Library System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1829 has been declared as critical.
To fix CVE-2024-1829, ensure that input validation and sanitization are implemented on the arguments email, regno, phone, and username.
CVE-2024-1829 affects the code-projects Library System version 1.0, specifically the registration.php file located in Source/librarian/user/student.
CVE-2024-1829 can be exploited to manipulate user input and potentially execute SQL injection attacks.
As of now, there is no official patch released for CVE-2024-1829; users should implement workaround measures.