CVE-2023-45012
📋 TL;DR
Online Bus Booking System v1.0 contains unauthenticated SQL injection vulnerabilities in the bus_info.php file. Attackers can execute arbitrary SQL commands without authentication, potentially compromising the entire database. All deployments of this specific software version are affected.
💻 Affected Systems
- Online Bus Booking System
📦 What is this software?
Online Bus Booking System by Online Bus Booking System Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, and potential remote code execution on the database server.
Likely Case
Database information disclosure, authentication bypass, and privilege escalation leading to unauthorized access to sensitive booking data.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages or partial data exposure.
🎯 Exploit Status
SQL injection via user_email parameter requires no authentication and can be exploited with basic SQL injection techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement proper input validation and parameterized queries for the user_email parameter in bus_info.php
Modify bus_info.php to use prepared statements with parameterized queries
Web Application Firewall (WAF)
allDeploy a WAF with SQL injection protection rules
Configure WAF to block SQL injection patterns in user_email parameter
🧯 If You Can't Patch
- Implement network segmentation to isolate the vulnerable system from sensitive networks
- Deploy database monitoring and alerting for suspicious SQL queries
🔍 How to Verify
Check if Vulnerable:
Test the bus_info.php endpoint with SQL injection payloads in the user_email parameter (e.g., ' OR '1'='1)
Check Version:
Check system documentation or configuration files for version information
Verify Fix Applied:
Verify that SQL injection payloads no longer execute and return appropriate error messages
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts with SQL-like patterns
Network Indicators:
- HTTP requests to bus_info.php with SQL injection patterns in parameters
- Unusual database query patterns from web server
SIEM Query:
source="web_logs" AND uri="*bus_info.php*" AND (param="*user_email*" AND value="*OR*" OR value="*UNION*" OR value="*SELECT*" OR value="*--*" OR value="*'*'*'*")