SQL Injection vulnerability from phpgurukul Boat Booking System 1.0 (book-boat.php)
CVE-2024-10153
A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument nopeople with an unknown input leads to a sql injection vulnerability. The CWE definition for the vulnerability is CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. As an impact it is known to affect confidentiality, integrity, and availability.
Affected Project: Boat Booking System 1.0
Official Website: https://phpgurukul.com/boat-booking-system-using-php-and-mysql/
Version: 1.0
Related Code file: book-boat.php
Injection parameter: nopeople
Vulnerability Description
When booking a boat, nopeople parameter is vulnerable to SQL injection vulnerability.
Demonstration
Below is how boat booking system looks like:
Let’s fill in some random information to it:
Intercept the boat booking traffic using Burp Suite:
Now copy-paste the traffic and save it in to book-boat.req
and run sqlmap
against it: sqlmap -r book-boat.req --batch
sqlmap
automatically exploit the vulnerability: