SQL Injection vulnerability from phpgurukul Boat Booking System 1.0 (/admin/edit-subadmin.php)

CVE-2024-10162

A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects an unknown part of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber with an unknown input leads to a sql injection vulnerability. The CWE definition for the vulnerability is CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. As an impact it is known to affect confidentiality, integrity, and availability.

Affected Project: Boat Booking System 1.0

Official Website: https://phpgurukul.com/boat-booking-system-using-php-and-mysql/

Version: 1.0

Related Code file: /admin/edit-subadmin.php

Injection parameter: mobilenumber

Vulnerability Description

When editing subadmin profile, mobilenumber parameter is vulnerable to SQL injection vulnerability.

Demonstration

Below is how edit-subadmin.php looks like:

Screenshot from 2024-10-17 14-16-09

Intercept the profile update traffic using Burp Suite:

Screenshot from 2024-10-17 14-27-13

Now copy-paste the traffic and save it in to profile-edit.req and run sqlmap against it: sqlmap -r profile-edit.req --batch

sqlmap automatically exploit the vulnerability:

Screenshot from 2024-10-17 14-27-25