CVE-2025-63451
📋 TL;DR
Car-Booking-System-PHP v1.0 contains a SQL injection vulnerability in the sign-in page that allows attackers to execute arbitrary SQL commands. This affects all deployments of this specific software version. Attackers can potentially bypass authentication, extract sensitive data, or compromise the database.
💻 Affected Systems
- Car-Booking-System-PHP
📦 What is this software?
Car Booking System Php by Car Booking System Php Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, authentication bypass, privilege escalation, and potential remote code execution via database functions.
Likely Case
Authentication bypass allowing unauthorized access to the booking system, extraction of user credentials and personal data, and manipulation of booking records.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing successful exploitation.
🎯 Exploit Status
SQL injection in authentication endpoint is trivial to exploit with common tools like sqlmap. Public GitHub repository contains research details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
1. Check for official patch from vendor. 2. If unavailable, implement parameterized queries in /carlux/sign-in.php. 3. Replace direct user input concatenation with prepared statements. 4. Add input validation for username/password fields.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF with SQL injection rules to block exploitation attempts
Input Validation Filter
allAdd PHP input validation to reject SQL special characters in login fields
// Add to sign-in.php before processing:
$username = preg_replace('/[^a-zA-Z0-9@._-]/', '', $_POST['username']);
$password = preg_replace('/[^a-zA-Z0-9@._-]/', '', $_POST['password']);
🧯 If You Can't Patch
- Isolate the system from internet access and restrict to internal network only
- Implement strict network segmentation and monitor all database queries from the application
🔍 How to Verify
Check if Vulnerable:
Test with sqlmap: sqlmap -u "http://target/carlux/sign-in.php" --data="username=test&password=test" --dbs
Check Version:
Check PHP files for version comments or README files
Verify Fix Applied:
Attempt SQL injection payloads in login fields and verify they are rejected or properly escaped
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL syntax errors in application logs
- Multiple failed login attempts with SQL payloads
- Database queries containing UNION, SELECT, or other injection patterns
Network Indicators:
- HTTP POST requests to /carlux/sign-in.php with SQL keywords in parameters
- Unusual database connection patterns from web server
SIEM Query:
source="web_logs" AND uri="/carlux/sign-in.php" AND (body CONTAINS "UNION" OR body CONTAINS "SELECT" OR body CONTAINS "OR 1=1")