Description
Simple Client Management System 1.0 is vulnerable to SQL Injection via /cms/classes/Master.php?f=delete_service.
Affected Software
{"id": "CVE-2022-29750", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2022-29750", "description": "Simple Client Management System 1.0 is vulnerable to SQL Injection via /cms/classes/Master.php?f=delete_service.", "published": "2022-05-12T15:15:00", "modified": "2022-05-19T01:30:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29750", "reporter": "cve@mitre.org", "references": ["https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-client-management-system/SQLi-3.md"], "cvelist": ["CVE-2022-29750"], "immutableFields": [], "lastseen": "2022-05-19T05:41:18", "viewCount": 19, "enchantments": {"twitter": {"counter": 5, "tweets": [{"link": "https://twitter.com/www_sesin_at/status/1526047426657759234", "text": "New post from https://t.co/9KYxtdHHVL (CVE-2022-29750) has been published on https://t.co/GLvMPuqJbb", "author": "www_sesin_at", "author_photo": "https://pbs.twimg.com/profile_images/958100963822329858/fb_N8h5n_400x400.jpg"}, {"link": "https://twitter.com/WolfgangSesin/status/1526047425173020674", "text": "New post from https://t.co/uXvPWJy6tj (CVE-2022-29750) has been published on https://t.co/sOaGmROpCm", "author": "WolfgangSesin", "author_photo": "https://pbs.twimg.com/profile_images/957011635369054208/Om3jbj7z_400x400.jpg"}, {"link": "https://twitter.com/threatintelctr/status/1527215802553802752", "text": " NEW: CVE-2022-29750 Simple Client Management System 1.0 is vulnerable to SQL Injection via /cms/classes/Master.php?f=delete_service. Severity: CRITICAL https://t.co/IejhnXI0Gl", "author": "threatintelctr", "author_photo": "https://pbs.twimg.com/profile_images/904224973987840000/dMy1x9Ho_400x400.jpg"}]}, "score": {"value": 4.4, "vector": "NONE"}, "vulnersScore": 4.4}, "_state": {"twitter": 1652957217, "score": 1659861495, "dependencies": 1660016581}, "_internal": {"score_hash": "e3e51d20d63611056719ae277366e677"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:simple_client_management_system_project:simple_client_management_system:1.0"], "cpe23": ["cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*"], "cwe": ["CWE-89"], "affectedSoftware": [{"cpeName": "simple_client_management_system_project:simple_client_management_system", "version": "1.0", "operator": "eq", "name": "simple client management system project simple client management system"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-client-management-system/SQLi-3.md", "name": "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-client-management-system/SQLi-3.md", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}]}
{}