CVE-2023-2073
HIGHCVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Login.php. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226051.
AnalysisAI
A critical SQL injection vulnerability exists in the Login.php file of Campcodes Online Traffic Offense Management System 1.0, specifically in the password parameter handling. The vulnerability allows remote attackers to bypass authentication and manipulate database queries without requiring any privileges or user interaction. A public proof-of-concept exploit is available on GitHub, though the EPSS score of 0.07% (20th percentile) suggests relatively low observed exploitation activity in the wild.
Technical ContextAI
This vulnerability affects the Campcodes Online Traffic Offense Management System version 1.0 (CPE: cpe:2.3:a:campcodes:online_traffic_offense_management_system:1.0:*:*:*:*:*:*:*), a PHP-based web application for managing traffic violations. The root cause is CWE-89 (SQL Injection), where user-supplied input in the password parameter of /classes/Login.php is not properly sanitized or parameterized before being used in SQL queries. This classic injection flaw allows attackers to inject malicious SQL commands through the authentication mechanism, bypassing input validation and potentially executing arbitrary database operations including authentication bypass, data extraction, modification, or deletion.
RemediationAI
No official patch or updated version has been identified in the available references for this vulnerability. Organizations running Campcodes Online Traffic Offense Management System 1.0 should immediately implement compensatory controls including: deploy a web application firewall (WAF) with SQL injection signatures to filter malicious input to /classes/Login.php; implement strict input validation and parameterized queries in the authentication code; restrict network access to the application to trusted IP ranges only; and conduct thorough code review of all database query implementations to identify and remediate similar SQL injection vulnerabilities. If the application is not business-critical, consider decommissioning it entirely given the lack of vendor support and available security updates. Monitor the VulDB entries at https://vuldb.com/?id.226051 for any future patch announcements.
Share
External POC / Exploit Code
Leaving vuln.today