SQL Injection vulnerability from phpgurukul Boat Booking System 1.0 (status.php)

CVE-2024-10154

A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file status.php of the component Check Booking Status Page. The manipulation of the argument emailid with an unknown input leads to a sql injection vulnerability. Using CWE to declare the problem leads to CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Impacted is confidentiality, integrity, and availability.

Affected Project: Boat Booking System 1.0

Official Website: https://phpgurukul.com/boat-booking-system-using-php-and-mysql/

Version: 1.0

Related Code file: status.php

Injection parameter: emailid

Vulnerability Description

When checking the boat booking status, emailid parameter is vulnerable to SQL injection vulnerability.

Demonstration

Users can check their boat booking status as such:

Screenshot from 2024-10-17 10-59-05

Intercept the status check traffic using Burp Suite:

Screenshot from 2024-10-17 11-04-51

Now copy-paste the traffic and save it in to status.req and run sqlmap against it: sqlmap -r status.req --batch

sqlmap automatically exploit the vulnerability:

Screenshot from 2024-10-17 11-05-37