A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. Affected is the function fln_update of the file /_parse/_all_edits.php. The manipulation of the argument fname/lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/glqt/CVE/blob/main/sql-glqt.md | Exploit Third Party Advisory |
https://github.com/glqt/CVE/blob/main/sql-glqt.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.289332 | Permissions Required VDB Entry |
https://vuldb.com/?id.289332 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.469002 | Third Party Advisory VDB Entry |
Configurations
History
03 Apr 2025, 13:26
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CPE | cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Code-projects job Recruitment
Code-projects |
|
References | () https://vuldb.com/?ctiid.289332 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.289332 - Third Party Advisory, VDB Entry | |
References | () https://code-projects.org/ - Product | |
References | () https://github.com/glqt/CVE/blob/main/sql-glqt.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?submit.469002 - Third Party Advisory, VDB Entry |
30 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 |
26 Dec 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-26 22:15
Updated : 2025-04-03 13:26
NVD link : CVE-2024-12967
Mitre link : CVE-2024-12967
JSON object : View
Products Affected
code-projects
- job_recruitment
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')