First published: Tue Aug 06 2024(Updated: )
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'code' in '/admin/mod_reservation/controller.php' parameter.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Janobe Credit Card | =1.0 | |
Janobe Debit Card Payment | =1.0 | |
Janobe Paypal | =1.0 | |
Janobe School Attendence Monitoring System | =1.0 | |
Janobe School Event Management System | =1.0 |
There is no reported solution at this time.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33961 is classified as a high severity SQL injection vulnerability.
To mitigate CVE-2024-33961, it is recommended to upgrade to the latest secure version of the affected Janobe software.
CVE-2024-33961 affects Janobe's Credit Card, Debit Card Payment, PayPal, School Attendance Monitoring System, and School Event Management System, all at version 1.0.
An attacker can exploit CVE-2024-33961 by sending a specially crafted SQL query to the server.
Exploitation of CVE-2024-33961 could allow an attacker to retrieve all information stored in the vulnerable database.