Vehicle Management System 1.0 is vulnerable to SQL Injection. A guest user can exploit vulnerable POST parameters in various administrative actions, such as booking a vehicle or confirming a booking. The affected parameters include "Booking ID", "Action Name", and "Payment Confirmation ID", which are present in /newvehicle.php and /newdriver.php.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://vehicle.com | |
https://github.com/ShadowByte1/CVE-2024-48245 |
History
Tue, 07 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-89 | |
Metrics |
cvssV3_1
|
Tue, 07 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vehicle Management System 1.0 is vulnerable to SQL Injection. A guest user can exploit vulnerable POST parameters in various administrative actions, such as booking a vehicle or confirming a booking. The affected parameters include "Booking ID", "Action Name", and "Payment Confirmation ID", which are present in /newvehicle.php and /newdriver.php. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2025-01-07T00:00:00
Updated: 2025-01-07T20:01:18.286Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48245
Vulnrichment
Updated: 2025-01-07T19:59:43.149Z
NVD
Status : Received
Published: 2025-01-07T16:15:34.730
Modified: 2025-01-07T20:15:29.750
Link: CVE-2024-48245
Redhat
No data.