A vulnerability, which was classified as critical, has been found in SourceCodester Simple Chat System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=read_msg of the component POST Parameter Handler. The manipulation of the argument convo_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230348.
References
Link | Resource |
---|---|
https://github.com/sikii7/CVE/blob/main/SQL.md | Exploit |
https://vuldb.com/?ctiid.230348 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.230348 | Permissions Required Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2023-05-31 09:15
Updated : 2024-05-17 02:27
NVD link : CVE-2023-3004
Mitre link : CVE-2023-3004
CVE.ORG link : CVE-2023-3004
JSON object : View
Products Affected
simple_chat_system_project
- simple_chat_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')