CVE-2021-44866

7.5 HIGH

📋 TL;DR

This CVE describes a SQL injection vulnerability in Online-Movie-Ticket-Booking-System 1.0 where the about.php file fails to validate the 'id' parameter. Attackers can inject malicious SQL queries to extract sensitive database information. Anyone running this specific PHP application version is affected.

💻 Affected Systems

Products:
  • Online-Movie-Ticket-Booking-System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific PHP application version 1.0 from the referenced GitHub repository.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including user credentials, payment information, and administrative access leading to data theft and system takeover.

🟠

Likely Case

Extraction of sensitive user data like usernames, emails, and potentially hashed passwords from the database.

🟢

If Mitigated

Limited information disclosure if database permissions are properly restricted and sensitive data is encrypted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection is a well-known attack vector with many automated tools available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6

Restart Required: No

Instructions:

1. Review the GitHub issue for community fixes
2. Manually implement input validation and parameterized queries in about.php
3. Sanitize all user inputs before database interaction

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation to sanitize the 'id' parameter before processing

Modify about.php to include: $id = filter_var($_GET['id'], FILTER_SANITIZE_NUMBER_INT);

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns

Configure WAF to block requests containing SQL keywords like UNION, SELECT, INSERT, DELETE when in about.php parameters

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system
  • Deploy database monitoring to detect unusual query patterns

🔍 How to Verify

Check if Vulnerable:

Test about.php with SQL injection payloads like: about.php?id=1' OR '1'='1

Check Version:

Check application version in source code or configuration files

Verify Fix Applied:

Test with same payloads and verify they are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in PHP logs
  • Multiple failed login attempts following SQL injection patterns

Network Indicators:

  • HTTP requests to about.php with SQL keywords in parameters
  • Unusual database query patterns from web server

SIEM Query:

source="web_logs" AND uri="*about.php*" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*")

🔗 References

📤 Share & Export