SQL Injection vulnerability from phpgurukul Boat Booking System 1.0 (/admin/bwdates-report-details.php)

CVE-2024-10160

A vulnerability, which was classified as critical, has been found in PHPGurukul Boat Booking System 1.0. Affected by this issue is an unknown functionality of the file /admin/bwdates-report-details.php of the component BW Dates Report Page. The manipulation of the argument fdate/tdate with an unknown input leads to a sql injection vulnerability. Using CWE to declare the problem leads to CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Impacted is confidentiality, integrity, and availability.

Affected Project: Boat Booking System 1.0

Official Website: https://phpgurukul.com/boat-booking-system-using-php-and-mysql/

Version: 1.0

Related Code file: /admin/bwdates-report-details.php

Injection parameter: fdate

Vulnerability Description

When interacting with B/w Dates Report, fdate parameter is vulnerable to SQL injection vulnerability.

Demonstration

User can interact with B/w Dates Report as such:

Screenshot from 2024-10-17 13-23-41

Intercept the traffic using Burp Suite:

Screenshot from 2024-10-17 13-23-50

Now copy-paste the traffic and save it in to report.req and run sqlmap against it: sqlmap -r report.req --batch

sqlmap automatically exploit the vulnerability:

Screenshot from 2024-10-17 13-24-00