A SQL injection vulnerability in "/login.php" of the Kashipara Bus Ticket Reservation System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the "email" or "password" Login page parameters.
References
| Link | Resource |
|---|---|
| https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/SQL%20Injection%20-%20Login.pdf | Exploit Third Party Advisory |
| https://www.kashipara.com/ | Product |
Configurations
History
06 May 2025, 13:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Bus%20Ticket%20Reservation%20System%20v1.0/SQL%20Injection%20-%20Login.pdf - Exploit, Third Party Advisory | |
| References | () https://www.kashipara.com/ - Product | |
| First Time |
Kjayvik
Kjayvik bus Ticket Reservation System |
|
| CPE | cpe:2.3:a:kjayvik:bus_ticket_reservation_system:1.0:*:*:*:*:*:*:* |
Information
Published : 2024-08-23 15:15
Updated : 2025-05-06 13:48
NVD link : CVE-2024-42765
Mitre link : CVE-2024-42765
CVE.ORG link : CVE-2024-42765
JSON object : View
Products Affected
kjayvik
- bus_ticket_reservation_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
