First published: Thu May 16 2024(Updated: )
A vulnerability was found in SourceCodester Interactive Map with Marker 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /endpoint/delete-mark.php. The manipulation of the argument mark leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264535.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
SourceCodester Interactive Map with Marker | ||
Rems Interactive Map With Marker | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4967 is classified as a critical vulnerability.
To mitigate CVE-2024-4967, it is recommended to sanitize and validate all user inputs in the /endpoint/delete-mark.php file.
CVE-2024-4967 facilitates SQL injection attacks through improper handling of input in the delete-mark.php endpoint.
CVE-2024-4967 affects SourceCodester Interactive Map with Marker version 1.0.
CVE-2024-4967 exploits an unknown functionality in the file /endpoint/delete-mark.php.