First published: Fri Jul 28 2023(Updated: )
Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the editid parameter of the edit-cateogry-detail.php file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rail Pass Management System Project Rail Pass Management System | =1.0 | |
PHPGurukul Rail Pass Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31937 has been classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2023-31937, implement input validation and parameterized queries to mitigate SQL injection risks.
CVE-2023-31937 affects Rail Pass Management System version 1.0 from both the Rail Pass Management System Project and PHPGurukul.
Yes, CVE-2023-31937 can allow an attacker to access and manipulate database entries, resulting in potential data leakage.
The exploit vector for CVE-2023-31937 is the 'editid' parameter in the edit-category-detail.php file, which is vulnerable to SQL injection.