2023-12-21 23:00:28 +00:00
{
"id" : "CVE-2023-48689" ,
"sourceIdentifier" : "help@fluidattacks.com" ,
"published" : "2023-12-21T21:15:11.130" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:32:15.797" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-21 23:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.\u00a0The 'byname' parameter of the train.php resource\u00a0does not validate the characters received and they\u00a0are sent unfiltered to the database.\n\n"
2023-12-22 13:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Railway Reservation System v1.0 es afectado por m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL no autenticada. El par\u00e1metro 'byname' del recurso train.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
2023-12-21 23:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "help@fluidattacks.com" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-12-21 23:00:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-12-21 23:00:28 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "help@fluidattacks.com" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-12-21 23:00:28 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2023-12-29 15:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:projectworlds:railway_reservation_system:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17BFF349-37D8-4FF1-9587-F64007EEA3AF"
}
]
}
]
}
] ,
2023-12-21 23:00:28 +00:00
"references" : [
{
"url" : "https://fluidattacks.com/advisories/barenboim/" ,
2023-12-29 15:00:28 +00:00
"source" : "help@fluidattacks.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-12-21 23:00:28 +00:00
} ,
{
"url" : "https://projectworlds.in/" ,
2023-12-29 15:00:28 +00:00
"source" : "help@fluidattacks.com" ,
"tags" : [
"Product"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://fluidattacks.com/advisories/barenboim/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://projectworlds.in/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
2023-12-21 23:00:28 +00:00
}
]
}