cve/2024/CVE-2024-11059.md

29 lines
2.2 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-11059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11059)
![](https://img.shields.io/static/v1?label=Product&message=Free%20Download%20Online%20Shopping%20System&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0.9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=192.168.1.88%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=46.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Injection&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=SQL%20Injection&color=brightgreen)
### Description
A vulnerability was found in Project Worlds Free Download Online Shopping System up to 192.168.1.88. It has been rated as critical. This issue affects some unknown processing of the file /online-shopping-webvsite-in-php-master/success.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Eine Schwachstelle wurde in Project Worlds Free Download Online Shopping System bis 192.168.1.88 ausgemacht. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei /online-shopping-webvsite-in-php-master/success.php. Mittels dem Manipulieren des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
### POC
#### Reference
- https://vuldb.com/?id.283805
#### Github
No PoCs found on GitHub currently.