### [CVE-2024-7798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7798) ![](https://img.shields.io/static/v1?label=Product&message=Simple%20Online%20Bidding%20System&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=login2. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. ### POC #### Reference - https://github.com/Wsstiger/cve/blob/main/Sourcecoster_sql2.md #### Github No PoCs found on GitHub currently.