Enviar #560863: PHPGurukul Boat Booking System V1.0 SQL Injectioninformación

TítuloPHPGurukul Boat Booking System V1.0 SQL Injection
DescripciónDuring the security assessment of "Boat Booking System", I detected a critical SQL injection vulnerability in the "/admin/booking-details.php" file. This vulnerability is attributed to the insufficient validation of user input for the "status (POST)" parameter. This inadequacy enables attackers to inject malicious SQL queries. Consequently, attackers can access the database without proper authorization, modify or delete data, and obtain sensitive information. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
Fuente⚠️ https://github.com/Iandweb/CVE/issues/9
Usuario
 Quest (UID 84287)
Sumisión2025-04-17 13:44 (hace 1 Año)
Moderación2025-04-30 20:26 (13 days later)
EstadoAceptado
Entrada de VulDB306689 [PHPGurukul Boat Booking System 1.0 booking-details.php Estado inyección SQL]
Puntos20

Interested in the pricing of exploits?

See the underground prices here!