Daily Expenses Management System version 1.0, developed by PHP Gurukul, contains a time-based blind SQL injection vulnerability in the 'add-expense.php' page. An attacker can exploit the 'item' parameter in a POST request to execute arbitrary SQL commands in the backend database. This can be done by injecting specially crafted SQL queries that make the database perform time-consuming operations, thereby confirming the presence of the SQL injection vulnerability based on the delay in the server's response.
Metrics
Affected Vendors & Products
References
History
Thu, 27 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-89 |
Thu, 27 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Anuj Kumar
Anuj Kumar daily Expenses Management System |
|
CPEs | cpe:2.3:a:anuj_kumar:daily_expenses_management_system:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Anuj Kumar
Anuj Kumar daily Expenses Management System |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-27T19:07:43.831Z
Reserved: 2024-03-19T00:00:00.000Z
Link: CVE-2024-29390

Updated: 2024-08-02T01:10:55.428Z

Status : Awaiting Analysis
Published: 2024-06-20T21:15:49.583
Modified: 2025-03-27T20:15:25.893
Link: CVE-2024-29390

No data.