PHPGurukul MedicCardGen 1.0: /admin/changeimage.php SQLi via editid
CVE-2024-10297 Published on October 23, 2024

PHPGurukul Medical Card Generation System Managecard Edit Image Page changeimage.php sql injection
A vulnerability was found in PHPGurukul Medical Card Generation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/changeimage.php of the component Managecard Edit Image Page. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Type

What is a SQL Injection Vulnerability?

The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE-2024-10297 has been classified to as a SQL Injection vulnerability or weakness.


Products Associated with CVE-2024-10297

stack.watch emails you whenever new vulnerabilities are published in Anujk305 Medical Card Generation System or PHPGurukul Medical Card Generation System. Just hit a watch button to start following.

 
 

Affected Versions

PHPGurukul Medical Card Generation System Version 1.0 is affected by CVE-2024-10297

Exploit Probability

EPSS
0.08%
Percentile
22.75%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.