First published: Fri Jul 28 2023(Updated: )
Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the editid parameter of the edit-pass-detail.php file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rail Pass Management System Project Rail Pass Management System | =1.0 | |
PHPGurukul Rail Pass Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31933 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2023-31933, validate and sanitize the input for the editid parameter in the edit-pass-detail.php file.
CVE-2023-31933 affects the Rail Pass Management System version 1.0 provided by both the Rail Pass Management System Project and PHPGurukul.
Yes, CVE-2023-31933 can be exploited remotely by an attacker who has access to the editid parameter.
CVE-2023-31933 is classified as an SQL injection vulnerability, allowing attackers to execute arbitrary SQL queries.