CVE-2025-63451

9.8 CRITICAL

📋 TL;DR

Car-Booking-System-PHP v1.0 contains a SQL injection vulnerability in the sign-in page that allows attackers to execute arbitrary SQL commands. This affects all deployments of this specific software version. Attackers can potentially bypass authentication, extract sensitive data, or compromise the database.

💻 Affected Systems

Products:
  • Car-Booking-System-PHP
Versions: v1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of v1.0 regardless of configuration. The vulnerability is in the core authentication code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Authentication bypass allowing unauthorized access to the booking system, extraction of user credentials and personal data, and manipulation of booking records.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection in authentication endpoint is trivial to exploit with common tools like sqlmap. Public GitHub repository contains research details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

1. Check for official patch from vendor. 2. If unavailable, implement parameterized queries in /carlux/sign-in.php. 3. Replace direct user input concatenation with prepared statements. 4. Add input validation for username/password fields.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block exploitation attempts

Input Validation Filter

all

Add PHP input validation to reject SQL special characters in login fields

// Add to sign-in.php before processing:
$username = preg_replace('/[^a-zA-Z0-9@._-]/', '', $_POST['username']);
$password = preg_replace('/[^a-zA-Z0-9@._-]/', '', $_POST['password']);

🧯 If You Can't Patch

  • Isolate the system from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor all database queries from the application

🔍 How to Verify

Check if Vulnerable:

Test with sqlmap: sqlmap -u "http://target/carlux/sign-in.php" --data="username=test&password=test" --dbs

Check Version:

Check PHP files for version comments or README files

Verify Fix Applied:

Attempt SQL injection payloads in login fields and verify they are rejected or properly escaped

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax errors in application logs
  • Multiple failed login attempts with SQL payloads
  • Database queries containing UNION, SELECT, or other injection patterns

Network Indicators:

  • HTTP POST requests to /carlux/sign-in.php with SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/carlux/sign-in.php" AND (body CONTAINS "UNION" OR body CONTAINS "SELECT" OR body CONTAINS "OR 1=1")

🔗 References

📤 Share & Export