CVE-2020-24932

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to manipulate the database of the Complaint Management System by injecting harmful SQL code through the 'cid' parameter in a specific webpage, potentially exposing sensitive data or allowing unauthorized access. The attacker needs to know the URL structure and have access to the complaint-details.php page to exploit this weakness.

Technical Description

An SQL Injection vulnerability exists in Sourcecodester Complaint Management System 1.0 via the cid parameter in complaint-details.php.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 1591 days

Quick Information

Published

Oct 27, 2021

over 4 years ago

Last Modified

Mar 6, 2026

about 1 month ago

Vendor

razormist

Product

complaint management system