First published: Tue Aug 06 2024(Updated: )
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'view' in '/tubigangarden/admin/mod_accomodation/index.php' parameter.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Janobe Credit Card | =1.0 | |
Janobe Debit Card Payment | =1.0 | |
Janobe Paypal | =1.0 | |
Janobe School Attendence Monitoring System | =1.0 | |
Janobe School Event Management System | =1.0 |
There is no reported solution at this time.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33965 is classified as a high-severity SQL injection vulnerability.
To fix CVE-2024-33965, it is recommended to update the affected Janobe software to the latest available version.
CVE-2024-33965 affects version 1.0 of Janobe Credit Card, Debit Card Payment, PayPal, School Attendance Monitoring System, and School Event Management System.
An attacker can exploit CVE-2024-33965 by sending a specially crafted SQL query to the server to retrieve sensitive information.
As of now, the best approach is to apply the recommended patch, as no specific workaround is provided for CVE-2024-33965.