#VU66681 SQL injection in Guest House Management System - CVE-2022-2847
Published: August 22, 2022
Vulnerability identifier: #VU66681
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-2847
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Guest House Management System
Guest House Management System
Software vendor:
sourcecodester
sourcecodester
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the "rid" argument in the /guestmanagement/front.php script. A remote user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.