First published: Thu Dec 21 2023(Updated: )
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'from' parameter of the reservation.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Railway Reservation System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48687 has been classified as a critical vulnerability due to multiple unauthenticated SQL injection vulnerabilities.
To fix CVE-2023-48687, implement input validation and parameterized queries to sanitize user inputs before processing them.
CVE-2023-48687 affects version 1.0 of the Railway Reservation System.
The risks associated with CVE-2023-48687 include unauthorized access to the database and potential data manipulation or leakage.
You can confirm if your system is vulnerable to CVE-2023-48687 by testing the input fields of the reservation.php resource for SQL injection exploits.