Billing Software v1.0 - Multiple SQLi
9.8
Critical
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Billing Software v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Code name
State
Public
Release date
Dec 6, 2023
Affected product
Billing Software
Vendor
Kashipara Group
Affected version(s)
Version 1.0
Vulnerability name
Unauthenticated SQL Injections (SQLi)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.0 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 base score
9.8
Exploit available
Yes
Description
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.
Vulnerabilities
CVE-2023-49622
The 'itemnameid' parameter of the material_bill.php?action=itemRelation resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49624
The 'cancelid' parameter of the material_bill.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49625
The 'id' parameter of the partylist_edit_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49633
The 'buyer_address' parameter of the buyer_detail_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49639
The 'customer_details' parameter of the buyer_invoice_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49641
The 'username' parameter of the loginCheck.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49658
The 'bank_details' parameter of the party_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49665
The 'quantity[]' parameter of the submit_delivery_list.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49666
The 'custmer_details' parameter of the submit_material_list.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
Our security policy
We have reserved the IDs CVE-2023-49622, CVE-2023-49624, CVE-2023-49625, CVE-2023-49633, CVE-2023-49639, CVE-2023-49641, CVE-2023-49658, CVE-2023-49665 and CVE-2023-49666 to refer to these issues from now on.
System Information
Version: Billing Software v1.0
Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://www.kashipara.com/
Timeline
Vulnerability discovered
Nov 24, 2023
Vendor contacted
Nov 24, 2023
Public disclosure
Dec 6, 2023