Vulnerability Description
A vulnerability was found in CodeAstro House Rental Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ownersignup.php. The manipulation of the argument f/e/p/m/o/n/c/s/ci/a leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "m" to be affected. But it must be assumed that many other parameters are affected as well.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Codeastro | House Rental Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://codeastro.com/Product
- https://github.com/Wind-liberty/CVE/issues/1ExploitThird Party Advisory
- https://vuldb.com/?ctiid.289303Permissions RequiredVDB Entry
- https://vuldb.com/?id.289303Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.468375Third Party AdvisoryVDB Entry
- https://github.com/Wind-liberty/CVE/issues/1ExploitThird Party Advisory
FAQ
What is CVE-2024-12943?
CVE-2024-12943 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in CodeAstro House Rental Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ownersignup.php. Th...
How severe is CVE-2024-12943?
CVE-2024-12943 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-12943?
Check the references section above for vendor advisories and patch information. Affected products include: Codeastro House Rental Management System.