First published: Thu Dec 21 2023(Updated: )
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Railway Reservation System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48689 is classified as a medium to high severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2023-48689, implement input validation on the 'byname' parameter to sanitize user inputs before processing them in the database.
CVE-2023-48689 affects Railway Reservation System version 1.0, which is developed by Projectworlds.
Yes, exploiting CVE-2023-48689 can allow attackers to extract sensitive data from the database via SQL injection.
No, CVE-2023-48689 is an unauthenticated SQL injection vulnerability, meaning it can be exploited without user login.