CVE-2025-2061

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the Online Ticket Reservation System 1.0 via the 'name' parameter in passenger.php. When users view affected pages, these scripts execute in their browsers, potentially stealing session cookies or redirecting to malicious sites. Anyone using this specific software version is affected.

💻 Affected Systems

Products:
  • code-projects Online Ticket Reservation System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with passenger.php accessible and the name parameter exposed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full system control, deface websites, or redirect users to phishing/malware sites.

🟠

Likely Case

Session hijacking of regular users, credential theft, or defacement of public-facing pages.

🟢

If Mitigated

Minimal impact if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub, making attacks easy to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Implement input validation and output encoding in passenger.php.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize the name parameter in passenger.php

Edit passenger.php to add: $name = htmlspecialchars($_POST['name'], ENT_QUOTES, 'UTF-8');

WAF Rule

all

Deploy web application firewall rules to block XSS payloads in name parameter

Add WAF rule: Detect and block patterns like <script>, javascript:, onload= in name parameter

🧯 If You Can't Patch

  • Disable or restrict access to passenger.php if not essential
  • Implement Content Security Policy (CSP) headers to mitigate script execution

🔍 How to Verify

Check if Vulnerable:

Test by submitting <script>alert('XSS')</script> in the name parameter of passenger.php and check if script executes.

Check Version:

Check software documentation or about page for version information

Verify Fix Applied:

Repeat the test payload; script should not execute and special characters should be properly encoded.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long strings in name parameter
  • Script tags or JavaScript patterns in passenger.php requests

Network Indicators:

  • HTTP requests to passenger.php with encoded script payloads in parameters

SIEM Query:

source="web_logs" AND uri="*passenger.php*" AND (param="*<script>*" OR param="*javascript:*" OR param="*onload=*")

🔗 References

📤 Share & Export