First published: Thu May 16 2024(Updated: )
A vulnerability classified as problematic has been found in SourceCodester Simple Online Bidding System 1.0. This affects an unknown part of the file /simple-online-bidding-system/admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264465 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Online Bidding System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4929 is classified as a problematic vulnerability due to its potential for exploitation.
To fix CVE-2024-4929, ensure that CSRF protections are implemented in the affected ajax.php file.
CVE-2024-4929 affects SourceCodester Simple Online Bidding System version 1.0.
CVE-2024-4929 is a cross-site request forgery (CSRF) vulnerability.
CVE-2024-4929 can lead to unauthorized actions being performed on behalf of users without their consent.