Submit #513284: Virtual Airlines Manager 2.6.2 SQL Injectioninfo

TitleVirtual Airlines Manager 2.6.2 SQL Injection
DescriptionA SQL Injection vulnerability exists in Virtual Airlines Manager v2.6.2 due to insufficient input validation in multiple GET parameters. This allows an attacker to inject arbitrary SQL queries, potentially leading to unauthorized database access, data exfiltration, and, depending on database permissions, data modification or deletion. The vulnerable endpoints include: /vam/index.php?page=manual_flight_details&ID=10 /vam/index.php?page=plane_info_public&registry_id=10 /vam/index.php?page=fleet_public&plane_icao=1 By exploiting this vulnerability, an attacker can enumerate database names, extract sensitive information such as user credentials (if stored in plaintext or weakly hashed), and potentially execute administrative operations.
Source⚠️ https://vam.fidusair.com/vam/index.php?page=manual_flight_details&ID=10
User
 davimo (UID 79678)
Submission03/03/2025 16:24 (1 Year ago)
Moderation03/15/2025 21:40 (12 days later)
StatusAccepted
VulDB entry299820 [VAM Virtual Airlines Manager up to 2.6.2 HTTP GET Parameter /vam/index.php ID/registry_id/plane_icao sql injection]
Points20

Want to know what is going to be exploited?

We predict KEV entries!