First published: Wed Apr 24 2024(Updated: )
SQL Injection vulnerability in PHP Task Management System v.1.0 allows a remote attacker to escalate privileges and obtain sensitive information via the task_id parameter of the task-details.php, and edit-task.php component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP Task Management System | ||
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28613 is categorized as a critical severity vulnerability due to the potential for privilege escalation and exposure of sensitive information.
To fix CVE-2024-28613, it is essential to sanitize and validate inputs for the task_id parameter in both task-details.php and edit-task.php components.
CVE-2024-28613 affects the task-details.php and edit-task.php components of PHP Task Management System version 1.0.
Yes, CVE-2024-28613 can be exploited remotely, allowing attackers to escalate privileges if the system is vulnerable.
As of now, there is no official patch available for CVE-2024-28613, and manual mitigation through code updates is recommended.