A vulnerability classified as critical was found in Home Clean Services Management System 1.0. This vulnerability affects the file login.php. The manipulation of the argument email with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(2)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. The attack can be initiated remotely but it requires authentication. Exploit details have been disclosed to the public.
History

Tue, 15 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2022-05-24T05:25:23.000Z

Updated: 2025-04-15T14:39:32.839Z

Reserved: 2022-05-24T00:00:00.000Z

Link: CVE-2022-1839

cve-icon Vulnrichment

Updated: 2024-08-03T00:17:00.682Z

cve-icon NVD

Status : Modified

Published: 2022-05-24T06:15:09.120

Modified: 2024-11-21T06:41:34.920

Link: CVE-2022-1839

cve-icon Redhat

No data.