A vulnerability classified as critical has been found in Home Clean Services Management System 1.0. This affects an unknown part of admin/login.php. The manipulation of the argument username with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(5)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. It is possible to initiate the attack remotely but it requires authentication. Exploit details have been disclosed to the public.
History

Tue, 15 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-04-15T14:39:43.651Z

Reserved: 2022-05-24T00:00:00.000Z

Link: CVE-2022-1838

cve-icon Vulnrichment

Updated: 2024-08-03T00:17:00.869Z

cve-icon NVD

Status : Modified

Published: 2022-05-24T06:15:09.027

Modified: 2024-11-21T06:41:34.743

Link: CVE-2022-1838

cve-icon Redhat

No data.