CVE-2023-45018
📋 TL;DR
Online Bus Booking System v1.0 contains unauthenticated SQL injection vulnerabilities in the login.php file, allowing attackers to execute arbitrary SQL commands without credentials. This affects all deployments of this specific software version. Attackers can potentially access, modify, or delete database contents.
💻 Affected Systems
- Online Bus Booking System
📦 What is this software?
Online Bus Booking System by Online Bus Booking System Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, authentication bypass, remote code execution, or system takeover
Likely Case
Database information disclosure, credential theft, and potential privilege escalation
If Mitigated
Limited impact if proper input validation and WAF rules are in place
🎯 Exploit Status
Simple SQL injection via username parameter requires no authentication
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://projectworlds.in/
Restart Required: No
Instructions:
1. Check vendor website for updated version
2. Replace vulnerable login.php file
3. Implement parameterized queries
4. Add input validation
🔧 Temporary Workarounds
Input Validation Workaround
allAdd input validation to login.php to filter SQL injection attempts
Edit includes/login.php to add input sanitization
WAF Protection
allDeploy web application firewall with SQL injection rules
🧯 If You Can't Patch
- Isolate the system behind a firewall with strict access controls
- Implement network segmentation and monitor for SQL injection attempts
🔍 How to Verify
Check if Vulnerable:
Test login.php with SQL injection payloads in username parameter
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Verify input validation prevents SQL injection attempts
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in web logs
- Multiple failed login attempts with SQL payloads
Network Indicators:
- SQL keywords in HTTP POST requests to login.php
SIEM Query:
source="web_logs" AND ("SQL syntax" OR "username=' OR" OR "UNION SELECT")