Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester Online Timesheet App 1.0. This affects an unknown part of the file /endpoint/delete-timesheet.php. The manipulation of the argument timesheet leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rems | Online Timesheet App | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/zz0zz0/CVE/blob/main/Online%20Timesheet%20App%20--SQL%20injecExploitThird Party Advisory
- https://vuldb.com/?ctiid.278823Permissions Required
- https://vuldb.com/?id.278823Third Party Advisory
- https://vuldb.com/?submit.413329Third Party Advisory
- https://www.sourcecodester.com/Product
FAQ
What is CVE-2024-9319?
CVE-2024-9319 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability, which was classified as critical, was found in SourceCodester Online Timesheet App 1.0. This affects an unknown part of the file /endpoint/delete-timesheet.php. The manipulation of th...
How severe is CVE-2024-9319?
CVE-2024-9319 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9319?
Check the references section above for vendor advisories and patch information. Affected products include: Rems Online Timesheet App.