Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2c28-f73p-mgcc

Опубликовано: 25 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A vulnerability classified as critical has been found in Home Clean Services Management System 1.0. This affects an unknown part of admin/login.php. The manipulation of the argument username with the input admin%'//AND//(SELECT//5383//FROM//(SELECT(SLEEP(5)))JPeh)//AND/**/'frfq%'='frfq leads to sql injection. It is possible to initiate the attack remotely but it requires authentication. Exploit details have been disclosed to the public.

A vulnerability classified as critical has been found in Home Clean Services Management System 1.0. This affects an unknown part of admin/login.php. The manipulation of the argument username with the input admin%'//AND//(SELECT//5383//FROM//(SELECT(SLEEP(5)))JPeh)//AND/**/'frfq%'='frfq leads to sql injection. It is possible to initiate the attack remotely but it requires authentication. Exploit details have been disclosed to the public.

EPSS

Процентиль: 55%
0.00321
Низкий

7.2 High

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 4.7
nvd
больше 3 лет назад

A vulnerability classified as critical has been found in Home Clean Services Management System 1.0. This affects an unknown part of admin/login.php. The manipulation of the argument username with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(5)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. It is possible to initiate the attack remotely but it requires authentication. Exploit details have been disclosed to the public.

EPSS

Процентиль: 55%
0.00321
Низкий

7.2 High

CVSS3

Дефекты

CWE-89