CVE-2022-31344
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to manipulate the online car wash booking system's database by sending specially crafted requests, which could lead to unauthorized access to sensitive information or even complete control over the database. The attacker needs to know the specific URL endpoint to exploit this flaw, making it crucial for users to secure their systems against such attacks.
Technical Description
Online Car Wash Booking System v1.0 is vulnerable to SQL Injection via /ocwbs/classes/Master.php?f=delete_booking.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jun 2, 2022
almost 4 years ago
Last Modified
Feb 18, 2026
about 2 months ago
Vendor
oretnom23
Product
online car wash booking system
Related Vulnerabilities
This vulnerability allows an attacker to remotely manipulate the date parameter in the daily task report feature of the employee task management system, potentially leading to unauthorized access to the database. To exploit this flaw, the attacker simply needs to send a specially crafted request to the affected system.
This vulnerability allows an attacker to execute malicious SQL commands on the employee task management system, potentially accessing or manipulating sensitive data. It can be exploited remotely by sending specially crafted requests to a specific part of the application without needing any special access or credentials.
An attacker can exploit a vulnerability in the login feature of a tourism website to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This can be done remotely by manipulating the username input, and the exploit is publicly known, making it easier for attackers to take advantage of it.
This vulnerability allows an attacker to manipulate the database of the online men's salon management system by injecting malicious SQL code through the admin service management page. To exploit this, the attacker needs access to the admin panel, which may require valid login credentials.
This vulnerability allows an attacker to manipulate the database of a men's salon management system by injecting harmful SQL commands through a specific URL. To exploit it, the attacker needs to access the system's delete service function, which could lead to unauthorized data deletion or exposure.