First published: Thu Dec 21 2023(Updated: )
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'psd' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Railway Reservation System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48685 is classified as a high severity vulnerability due to the potential for unauthenticated SQL injection attacks.
To fix CVE-2023-48685, ensure that all user inputs, particularly the 'psd' parameter, are properly validated and sanitized before processing.
CVE-2023-48685 affects Railway Reservation System version 1.0.
CVE-2023-48685 can be exploited to execute unauthorized SQL queries, potentially leading to data leakage or manipulation.
As of now, there are no publicly disclosed exploits for CVE-2023-48685, but the vulnerability poses a significant risk.