First published: Tue May 14 2024(Updated: )
SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in SourceCodester Visitor Management System 1.0 allow attackers to execute arbitrary SQL commands via the id parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Visitor Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34226 is classified as a high-severity SQL injection vulnerability.
To fix CVE-2024-34226, ensure proper validation and sanitization of the 'id' parameter before processing it in SQL queries.
CVE-2024-34226 can allow attackers to execute arbitrary SQL commands, potentially leading to data leakage or manipulation.
CVE-2024-34226 affects SourceCodester Visitor Management System version 1.0.
As a workaround for CVE-2024-34226, you can restrict input on the 'id' parameter to ensure only valid values are accepted.