The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.
References
| Link | Resource |
|---|---|
| https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-12-23 14:15
Updated : 2022-01-04 16:49
NVD link : CVE-2021-44600
Mitre link : CVE-2021-44600
CVE.ORG link : CVE-2021-44600
JSON object : View
Products Affected
online_mens_salon_management_system_project
- online_mens_salon_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
