Vulnerability Description
A vulnerability was found in SourceCodester Employee Management System. It has been classified as critical. Affected is an unknown function of the file /process/eprocess.php. The manipulation of the argument mailuid/pwd leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205836.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Employee Management System Project | Employee Management System | - |
Related Weaknesses (CWE)
References
- https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94EExploitThird Party Advisory
- https://vuldb.com/?id.205836Third Party AdvisoryVDB Entry
- https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94EExploitThird Party Advisory
- https://vuldb.com/?id.205836Third Party AdvisoryVDB Entry
FAQ
What is CVE-2022-2723?
CVE-2022-2723 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in SourceCodester Employee Management System. It has been classified as critical. Affected is an unknown function of the file /process/eprocess.php. The manipulation of the a...
How severe is CVE-2022-2723?
CVE-2022-2723 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2723?
Check the references section above for vendor advisories and patch information. Affected products include: Employee Management System Project Employee Management System.