Railway Reservation System v1.0 - SQLi
9.8
Critical
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Railway Reservation System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Code name
State
Public
Release date
Dec 6, 2023
Affected product
Railway Reservation System
Vendor
Projectworlds Pvt. Limited
Affected version(s)
Version 1.0
Vulnerability name
Unauthenticated SQL Injections (SQLi)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.0 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 base score
9.8
Exploit available
Yes
CVE ID(s)
Description
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.
Vulnerabilities
CVE-2023-48685
The 'psd' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-48687
The 'from' parameter of the reservation.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-48689
The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
Our security policy
We have reserved the IDs CVE-2023-48685, CVE-2023-48687 and CVE-2023-48689 to refer to these issues from now on.
System Information
Version: Railway Reservation System v1.0
Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://projectworlds.in/
Timeline
Vulnerability discovered
Nov 17, 2023
Vendor contacted
Nov 17, 2023
Public disclosure
Dec 6, 2023