Vehicle Management System 1.0 is vulnerable to SQL Injection. A guest user can exploit vulnerable POST parameters in various administrative actions, such as booking a vehicle or confirming a booking. The affected parameters include "Booking ID", "Action Name", and "Payment Confirmation ID", which are present in /newvehicle.php and /newdriver.php.
References
Link | Resource |
---|---|
http://vehicle.com | Not Applicable |
https://github.com/ShadowByte1/CVE-2024-48245 | Third Party Advisory Mitigation |
Configurations
History
14 May 2025, 16:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://vehicle.com - Not Applicable | |
References | () https://github.com/ShadowByte1/CVE-2024-48245 - Third Party Advisory, Mitigation | |
Summary |
|
|
CPE | cpe:2.3:a:janobe:vehicle_management_system:1.0:*:*:*:*:*:*:* | |
First Time |
Janobe vehicle Management System
Janobe |
07 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CWE | CWE-89 |
07 Jan 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-07 16:15
Updated : 2025-05-14 16:06
NVD link : CVE-2024-48245
Mitre link : CVE-2024-48245
CVE.ORG link : CVE-2024-48245
JSON object : View
Products Affected
janobe
- vehicle_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')