A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/state.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
History

Thu, 03 Apr 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul complaint Management System
CPEs cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*
Vendors & Products Phpgurukul
Phpgurukul complaint Management System

Fri, 27 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Dec 2024 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/state.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title PHPGurukul Complaint Management System state.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-12-27T18:41:07.314Z

Reserved: 2024-12-26T17:12:53.726Z

Link: CVE-2024-12977

cve-icon Vulnrichment

Updated: 2024-12-27T18:41:02.510Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-27T02:15:07.130

Modified: 2025-04-03T13:19:13.477

Link: CVE-2024-12977

cve-icon Redhat

No data.