### [CVE-2023-7139](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7139) ![](https://img.shields.io/static/v1?label=Product&message=Client%20Details%20System&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description A vulnerability has been found in code-projects Client Details System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/regester.php of the component HTTP POST Request Handler. The manipulation of the argument fname/lname/email/contact leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249142 is the identifier assigned to this vulnerability. ### POC #### Reference - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_3.md #### Github - https://github.com/h4md153v63n/CVEs - https://github.com/h4md153v63n/h4md153v63n