Billing Software v1.0 - Multiple SQLi
9,8
Critical
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Billing Software v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Code name
State
Public
Release date
6 dic 2023
Affected product
Billing Software
Vendor
Kashipara Group
Affected version(s)
Version 1.0
Vulnerability name
Unauthenticated SQL Injections (SQLi)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.0 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 base score
9.8
Exploit available
Yes
Description
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.
Vulnerabilities
CVE-2023-49622
The 'itemnameid' parameter of the material_bill.php?action=itemRelation resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49624
The 'cancelid' parameter of the material_bill.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49625
The 'id' parameter of the partylist_edit_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49633
The 'buyer_address' parameter of the buyer_detail_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49639
The 'customer_details' parameter of the buyer_invoice_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49641
The 'username' parameter of the loginCheck.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49658
The 'bank_details' parameter of the party_submit.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49665
The 'quantity[]' parameter of the submit_delivery_list.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-49666
The 'custmer_details' parameter of the submit_material_list.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
Our security policy
We have reserved the IDs CVE-2023-49622, CVE-2023-49624, CVE-2023-49625, CVE-2023-49633, CVE-2023-49639, CVE-2023-49641, CVE-2023-49658, CVE-2023-49665 and CVE-2023-49666 to refer to these issues from now on.
System Information
Version: Billing Software v1.0
Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://www.kashipara.com/
Timeline
IA generativa
24 nov 2023
Vendor contacted
24 nov 2023
Public disclosure
6 dic 2023