Asset Management System v1.0 - Authenticated SQL Injection (SQLi)
8.8
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Asset Management System v1.0 - Authenticated SQL Injection (SQLi)
Code name
State
Public
Release date
Sep 28, 2023
Affected product
Asset Management System
Affected version(s)
Version 1.0
Vulnerability name
Authenticated SQL Injection (SQLi)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v3.1 base score
8.8
Exploit available
Yes
CVE ID(s)
Description
Asset Management System v1.0 is vulnerable to an Authenticated SQL Injection vulnerability on the 'first_name' and 'last_name' parameters of user.php page, allowing an authenticated attacker to dump all the contents of the database contents.
Vulnerability
The 'first_name' and 'last_name' parameters of the user.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable function is 'update_profile()' located at core/functions/user.php:
Evidence of exploitation

Our security policy
We have reserved the ID CVE-2023-43014 to refer to this issue from now on. Disclosure policy
System Information
Version: Asset Management System v1.0
Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://projectworlds.in/
Timeline
Vulnerability discovered
Sep 21, 2023
Vendor contacted
Sep 21, 2023
Public disclosure
Sep 28, 2023