漏洞标题
PHPGurukul Boat Booking System status.php页面SQL注入漏洞
漏洞描述信息
在PHPGurukul Boat Booking System 1.0中发现了一个漏洞,并被归类为严重漏洞。该漏洞影响了组件“Check Booking Status Page”中文件status.php的某个未知功能。通过操纵参数emailid可导致SQL注入。此攻击可远程发起。该漏洞的利用方法已公开,可能被利用。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
PHPGurukul Boat Booking System Check Booking Status Page status.php sql injection
漏洞描述信息
A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file status.php of the component Check Booking Status Page. The manipulation of the argument emailid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
PHPGurukul Boat Booking System SQL注入漏洞
漏洞描述信息
PHPGurukul Boat Booking System是PHPGurukul公司的一个船票预订系统。 PHPGurukul Boat Booking System 1.0版本存在SQL注入漏洞,该漏洞源于Check Booking Status Page组件的status.php页面中的emailid参数包含一个SQL注入漏洞。
CVSS信息
N/A
漏洞类别
SQL注入