First published: Thu May 16 2024(Updated: )
A vulnerability, which was classified as critical, was found in SourceCodester Simple Online Bidding System 1.0. Affected is an unknown function of the file /simple-online-bidding-system/admin/index.php?page=manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264468.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Online Bidding System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4932 is classified as a critical vulnerability.
CVE-2024-4932 allows for SQL injection through manipulation of the 'id' argument in the manage_user function.
CVE-2024-4932 affects version 1.0 of the Simple Online Bidding System.
To mitigate CVE-2024-4932, ensure that input validation and parameterized queries are implemented to prevent SQL injection.
As of the current information, there is no public patch available specifically for CVE-2024-4932.