Vulnerability Summary
-
CVE ID: CVE-2023-50867
-
Severity: Critical (CVSS 3.1 Score: 9.8)
-
Attack Vector: Network
-
Privileges Required: None
-
User Interaction: None
-
Impact: Remote Code Execution, Data Exfiltration
CVE-2023-50867 is a critical vulnerability in the Travel Website v1.0 application, allowing unauthenticated attackers to perform SQL injection via the username
parameter in the signupAction.php
script. The application fails to properly sanitize user input, enabling attackers to execute arbitrary SQL commands on the backend database.
Affected Products
The following product is affected:
-
Product: Travel Website
-
Version: 1.0
-
Vendor: Kashipara
No phone number, email, or personal info required.
An attacker can exploit this vulnerability by sending a crafted HTTP POST request to the signupAction.php
endpoint with a malicious username
parameter. For example:
This payload manipulates the SQL query to always return true, potentially bypassing authentication or extracting sensitive data.
Potential Risks
-
Unauthorized access to sensitive user data
-
Modification or deletion of database records
-
Execution of arbitrary commands on the server
-
Complete compromise of the web application
Mitigation Recommendations
-
Input Validation: Implement strict input validation and sanitization for all user-supplied data.
-
Use Prepared Statements: Utilize parameterized queries or prepared statements to prevent SQL injection.
-
Update Software: If available, apply patches or updates provided by the vendor to address this vulnerability.
-
Restrict Database Permissions: Ensure the database user has the minimum necessary privileges to limit potential damage.
Conclusion
CVE-2023-50867 poses a significant threat to applications using Travel Website v1.0. Due to the ease of exploitation and the potential impact, it’s crucial to implement the recommended mitigations promptly to secure affected systems.
References