vendor:
Royal Event Management System
by:
Eren Gozaydin
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Royal Event Management System
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: CVE-2022-28080
CPE: a:sourcecodester:royal_event_management_system:1.0
Tags: royalevent,edb,cve,cve2022,sqli,authenticated,cms,intrusive
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.exploit-db.com/exploits/50934, https://www.sourcecodester.com/sites/default/files/download/oretnom23/RoyalEvent.zip, https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated, https://nvd.nist.gov/vuln/detail/CVE-2022-28080, https://www.sourcecodester.com/php/15238/event-management-system-project-php-source-code.html
Nuclei Metadata: {'max-request': 2, 'vendor': 'event_management_system_project', 'product': 'event_management_system'}
Platforms Tested: Windows 10 Pro + PHP 8.0.11, Apache 2.4.51
2022
Royal Event Management System 1.0 – ‘todate’ SQL Injection (Authenticated)
Royal Event Management System 1.0 allows SQL Injection via parameter 'todate' in /royal_event/btndates_report.php#?= Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.