vendor:
Microfinance Management System
by:
Eren Gozaydin
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Microfinance Management System
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: CVE-2022-27927
CPE: a:sourcecodester:microfinance_management_system:1.0
Tags: microfinance,edb,cve,cve2022,sqli
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27927, https://www.sourcecodester.com/sites/default/files/download/oretnom23/mims_0.zip, https://www.exploit-db.com/exploits/50891, https://nvd.nist.gov/vuln/detail/CVE-2022-27927, https://www.sourcecodester.com/php/14822/microfinance-management-system.html
Nuclei Metadata: {'max-request': 1, 'verified': True, 'vendor': 'microfinance_management_system_project', 'product': 'microfinance_management_system'}
Platforms Tested: Windows 10 Pro + PHP 8.0.11, Apache 2.4.51
2022
Microfinance Management System 1.0 – ‘customer_number’ SQLi
Microfinance Management System allows SQL Injection via parameter 'customer_number' in /mims/updatecustomer.php. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.