First published: Tue Aug 06 2024(Updated: )
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Attendance' and 'YearLevel' in '/report/attendance_print.php' parameter.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Janobe Credit Card | =1.0 | |
Janobe Debit Card Payment | =1.0 | |
Janobe Paypal | =1.0 | |
Janobe School Attendence Monitoring System | =1.0 | |
Janobe School Event Management System | =1.0 |
There is no reported solution at this time.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33973 is categorized as a high severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2024-33973, update all affected Janobe software applications to versions beyond 1.0.
CVE-2024-33973 affects Janobe Credit Card, Debit Card Payment, PayPal, School Attendance Monitoring System, and School Event Management System, all at version 1.0.
Exploitation of CVE-2024-33973 could allow attackers to execute SQL queries and retrieve sensitive information from the database.
Organizations using Janobe software version 1.0 for payment processing or school management systems are at risk due to CVE-2024-33973.