Online Movie Ticket Booking System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Summary
Name | Online Movie Ticket Booking System v1.0 - Multiple Unauthenticated SQL Injections (SQLi) |
Code name | |
Product | Online Movie Ticket Booking System |
Affected versions | Version 1.0 |
State | Public |
Release date | 2023-09-28 |
Vulnerabilities
Kind | Unauthenticated SQL Injections (SQLi) |
Rule | |
Remote | Yes |
CVSSv3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSSv3.1 Base Score | 9.8 |
Exploit available | Yes |
CVE ID(s) |
Description
Online Movie Ticket Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.
Vulnerabilities
CVE-2023-44163
The 'search' parameter of the process_search.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
<?php include('header.php'); extract($_POST); ?> </div> <div class="content"> <?php print_r($rs);?> <div class="wrap"> <div class="content-top"> <h3>Movies</h3>
<?php
$today=date("Y-m-d");
$qry2=mysqli_query($con,"select DISTINCT movie_name,movie_id,image,cast from tbl_movie where movie_name='".$search."'");
CVE-2023-44164
The 'Email' parameter of the process_login.php resource does not validate the characters received and they are sent unfiltered to the database. The relevant vulnerable code is:
include('config.php');
session_start();
$email = $_POST["Email"];
$pass = $_POST["Password"];
$qry=mysqli_query($con,"select * from tbl_login where username='$email' and password='$pass'");
CVE-2023-44166
The 'age' parameter of the process_registration.php resource does not validate the characters received and they are sent unfiltered to the database. The relevant vulnerable code is:
session_start();
include('config.php');
extract($_POST);
mysqli_query($con,"insert into tbl_registration values(NULL,'$name','$email','$phone','$age','gender')");
Our security policy
We have reserved the IDs CVE-2023-44163, CVE-2023-44164 and CVE-2023-44166 to refer to these issues from now on.
System Information
- Version: Online Movie Ticket Booking System v1.0
- Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
Credits
The vulnerability was discovered by Andres Roldan from Fluid Attacks' Offensive Team.
References
Vendor page https://projectworlds.in/
Timeline
2023-09-26
Vulnerability discovered.
2023-09-26
Vendor contacted.
2023-09-28
Public Disclosure.