Vulnerability Description
A vulnerability has been found in SourceCodester Simple Online Public Access Catalog 1.0 and classified as critical. This vulnerability affects unknown code of the file /opac/Actions.php?a=login of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210784.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Simple Online Public Access Catalog Project | Simple Online Public Access Catalog | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injecExploitThird Party Advisory
- https://vuldb.com/?id.210784Permissions RequiredThird Party Advisory
- https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injecExploitThird Party Advisory
- https://vuldb.com/?id.210784Permissions RequiredThird Party Advisory
FAQ
What is CVE-2022-3495?
CVE-2022-3495 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability has been found in SourceCodester Simple Online Public Access Catalog 1.0 and classified as critical. This vulnerability affects unknown code of the file /opac/Actions.php?a=login of th...
How severe is CVE-2022-3495?
CVE-2022-3495 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3495?
Check the references section above for vendor advisories and patch information. Affected products include: Simple Online Public Access Catalog Project Simple Online Public Access Catalog.