CVE-2023-2073

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to remotely execute SQL injection attacks on the Campcodes Online Traffic Offense Management System, potentially giving them access to sensitive data stored in the database. It can be exploited by manipulating the password input in the login process, making it critical for users to secure their systems immediately.

Technical Description

A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Login.php. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226051.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 1068 days

Quick Information

Published

Apr 14, 2023

almost 3 years ago

Last Modified

Mar 17, 2026

21 days ago

Vendor

campcodes

Product

online traffic offense management system

Related Vulnerabilities

CVE-2023-2077Medium

An attacker can inject malicious scripts into the Campcodes Online Traffic Offense Management System, allowing them to execute harmful actions in the context of a user's session. This can happen remotely when the attacker manipulates a specific part of the URL, making it important for users to be cautious when accessing links related to this system.

CVE-2023-2076Medium

This vulnerability allows an attacker to inject malicious scripts into the online traffic offense management system, potentially compromising user data or hijacking user sessions. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, making it a significant risk for users.

CVE-2023-2075High

This vulnerability allows an attacker to remotely manipulate the system and access or modify the database by exploiting a flaw in the way the application handles certain input. It specifically affects the online traffic offense management system and requires no special access, making it a high-risk issue for users of the software.

CVE-2023-2074Critical

This vulnerability allows an attacker to remotely manipulate the system's database by exploiting a flaw in the Online Traffic Offense Management System, potentially leading to unauthorized access to sensitive data. The attacker needs to send a specially crafted request to the system, making it critical for users to patch the software immediately to prevent exploitation.

CVE-2023-2055Medium

This vulnerability allows an attacker to inject malicious scripts into the voting system, potentially stealing sensitive information from users who visit the affected page. It can be exploited remotely, meaning an attacker doesn't need physical access to the system, making it a significant risk for any online voting setup.