Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-48689— Railway Reservation System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)

CVSS 9.8 · Critical EPSS 0.15% · P36
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-48689

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Railway Reservation System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Source: NVD (National Vulnerability Database)
Vulnerability Description
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Projectworlds Railway Reservation System SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Projectworlds Railway Reservation System是印度Projectworlds公司的一个铁路订票系统。 Projectworlds Railway Reservation System v1.0版本存在SQL注入漏洞,该漏洞源于train.php的“byname”参数不会验证收到的字符,并且会未经过滤地发送到数据库。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Projectworlds Pvt. LimitedRailway Reservation System 1.0 -

II. Public POCs for CVE-2023-48689

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-48689

登录查看更多情报信息。

Same Patch Batch · Projectworlds Pvt. Limited · 2023-12-21 · 16 CVEs total

CVE-2023-486859.8 CRITICALRailway Reservation System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
CVE-2023-486879.8 CRITICALRailway Reservation System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
CVE-2023-487169.8 CRITICALStudent Result Management System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
CVE-2023-487189.8 CRITICALStudent Result Management System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
CVE-2023-487209.8 CRITICALStudent Result Management System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
CVE-2023-487229.8 CRITICALStudent Result Management System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
CVE-2023-444818.8 HIGHLeave Management System Project v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-444828.8 HIGHLeave Management System Project v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-451158.8 HIGHOnline Examination System v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-451168.8 HIGHOnline Examination System v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-451178.8 HIGHOnline Examination System v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-451188.8 HIGHOnline Examination System v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-451198.8 HIGHOnline Examination System v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-451208.8 HIGHOnline Examination System v1.0 - Multiple Authenticated SQL Injections (SQLi)
CVE-2023-451218.8 HIGHOnline Examination System v1.0 - Multiple Authenticated SQL Injections (SQLi)

IV. Related Vulnerabilities

V. Comments for CVE-2023-48689

No comments yet


Leave a comment