Skip to main content

CVE-2024-12950: SQL Injection in code-projects Travel Management System

Medium
VulnerabilityCVE-2024-12950cvecve-2024-12950
Published: Thu Dec 26 2024 (12/26/2024, 12:00:14 UTC)
Source: CVE
Vendor/Project: code-projects
Product: Travel Management System

Description

A vulnerability was found in code-projects/projectworlds Travel Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /subcat.php. The manipulation of the argument catid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:12:05 UTC

Technical Analysis

CVE-2024-12950 is a SQL Injection vulnerability identified in version 1.0 of the Travel Management System developed by code-projects/projectworlds. The vulnerability exists in the /subcat.php file, specifically in the processing of the 'catid' parameter. An attacker can manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability is remotely exploitable without requiring user interaction or authentication, which increases its risk profile. However, the CVSS 4.0 score is 5.3 (medium severity), reflecting that the attack complexity is low but privileges required are low (PR:L), and the impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L). No known exploits are currently in the wild, and no patches have been published yet. The vulnerability could allow attackers to read or modify data in the database, potentially leading to data leakage, data corruption, or unauthorized actions within the application. Given the nature of travel management systems, which often handle sensitive customer and booking information, exploitation could compromise personal data and business operations.

Potential Impact

For European organizations using the affected Travel Management System 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. The potential impact includes exposure of personal identifiable information (PII) of customers, disruption of booking and travel management services, and reputational damage. Since the vulnerability allows remote exploitation without authentication, attackers could target these systems from anywhere, increasing the risk of widespread attacks. The medium severity rating suggests that while the impact is not catastrophic, it is significant enough to warrant immediate attention, especially for organizations handling sensitive travel data under GDPR regulations. Data breaches could lead to regulatory penalties and loss of customer trust. Additionally, compromised systems could be used as pivot points for further attacks within the organization's network.

Mitigation Recommendations

Organizations should immediately audit their use of the Travel Management System version 1.0 and identify any instances of the vulnerable /subcat.php component. Since no official patches are currently available, temporary mitigations include implementing web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'catid' parameter. Input validation and parameterized queries should be enforced in the application code to prevent injection. If possible, upgrade to a newer, patched version of the software once available. Conduct thorough security testing and code reviews focusing on input handling in the affected module. Monitor logs for suspicious activity related to SQL injection attempts. Additionally, restrict database user permissions to the minimum necessary to limit the potential damage of an injection attack. Organizations should also prepare incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-12-25T18:10:58.541Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb886

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 3:12:05 PM

Last updated: 7/27/2025, 1:16:58 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats