Travel Website v1.0 - Multiple SQLi
9,8
Critical
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Travel Website v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Code name
State
Public
Release date
3 ene 2024
Affected product
Travel Website
Vendor
Kashipara Group
Affected version(s)
Version 1.0
Vulnerability name
Unauthenticated SQL Injections (SQLi)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.0 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 base score
9.8
Exploit available
Yes
Description
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.
Vulnerabilities
CVE-2023-50862
The 'hotelIDHidden' parameter of the booking.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-50863
The 'hotelIDHidden' parameter of the generateReceipt.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-50864
The 'hotelId' parameter of the hotelDetails.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-50865
The 'city' parameter of the hotelSearch.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-50866
The 'username' parameter of the loginAction.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-50867
The 'username' parameter of the signupAction.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
Our security policy
We have reserved the IDs CVE-2023-50862, CVE-2023-50863, CVE-2023-50864, CVE-2023-50865, CVE-2023-50866 and CVE-2023-50867 to refer to these issues from now on.
System Information
Version: Travel Website v1.0
Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://www.kashipara.com/
Timeline
IA generativa
3 ene 2024
Vendor contacted
3 ene 2024
Public disclosure
3 ene 2024