First published: Tue Aug 06 2024(Updated: )
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'events' in '/report/event_print.php' parameter.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Janobe Credit Card | =1.0 | |
Janobe Debit Card Payment | =1.0 | |
Janobe Paypal | =1.0 | |
Janobe School Attendence Monitoring System | =1.0 | |
Janobe School Event Management System | =1.0 |
There is no reported solution at this time.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-33972 is classified as critical due to the potential for exploitation via SQL injection.
To fix CVE-2024-33972, it is recommended to update all affected Janobe products to their latest versions.
CVE-2024-33972 affects Janobe products that are version 1.0, including PayPal, Credit Card, and Debit Card Payment modules.
CVE-2024-33972 can enable attackers to perform SQL injection, potentially allowing them to access or manipulate sensitive data.
CVE-2024-33972 is a specific vulnerability impacting certain Janobe products and is categorized as a significant security concern.