SQL Injection vulnerability from phpgurukul Boat Booking System 1.0 (status.php)
CVE-2024-10154
A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file status.php of the component Check Booking Status Page. The manipulation of the argument emailid with an unknown input leads to a sql injection vulnerability. Using CWE to declare the problem leads to CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Impacted is confidentiality, integrity, and availability.
Affected Project: Boat Booking System 1.0
Official Website: https://phpgurukul.com/boat-booking-system-using-php-and-mysql/
Version: 1.0
Related Code file: status.php
Injection parameter: emailid
Vulnerability Description
When checking the boat booking status, emailid parameter is vulnerable to SQL injection vulnerability.
Demonstration
Users can check their boat booking status as such:
Intercept the status check traffic using Burp Suite:
Now copy-paste the traffic and save it in to status.req
and run sqlmap
against it: sqlmap -r status.req --batch
sqlmap
automatically exploit the vulnerability: