Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42764: n/a

0
Critical
VulnerabilityCVE-2024-42764cvecve-2024-42764
Published: Fri Aug 23 2024 (08/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Kashipara Bus Ticket Reservation System v1.0 is vulnerable to Cross Site Request Forgery (CSRF) via /deleteTicket.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:30:44 UTC

Technical Analysis

The vulnerability identified as CVE-2024-42764 affects Kashipara Bus Ticket Reservation System version 1.0, specifically through the /deleteTicket.php endpoint. This vulnerability is classified as a Cross Site Request Forgery (CSRF), which allows an attacker to trick authenticated users into submitting unwanted requests to the web application without their consent. In this case, the attacker can cause the deletion of bus tickets by sending crafted requests that the system processes as legitimate. The CVSS 3.1 base score of 9.4 indicates a critical severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H meaning the attack can be performed remotely over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality (limited), integrity (high), and availability (high). The lack of authentication or user interaction requirements makes exploitation straightforward. The vulnerability stems from the absence of proper anti-CSRF tokens or other CSRF mitigation mechanisms in the /deleteTicket.php script, which should verify the legitimacy of requests modifying state. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. However, the critical nature of the vulnerability demands immediate attention from system administrators and developers to prevent potential exploitation.

Potential Impact

The impact of CVE-2024-42764 is significant for organizations using the Kashipara Bus Ticket Reservation System. Successful exploitation allows attackers to delete tickets without authorization, compromising data integrity and potentially causing denial of service by disrupting ticket management operations. This can lead to financial losses, customer dissatisfaction, and operational disruptions in public transportation services. The confidentiality impact is limited but not negligible, as unauthorized requests might reveal some user-related information indirectly. The high integrity and availability impacts mean that attackers can manipulate or disrupt critical transactional data, undermining trust in the system. Given the ease of exploitation and lack of required privileges or user interaction, attackers can automate attacks at scale, potentially affecting many users and causing widespread service interruptions. Organizations relying on this system for ticket reservations are at risk of operational and reputational damage if the vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-42764, organizations should immediately implement robust CSRF protection mechanisms in the Kashipara Bus Ticket Reservation System, particularly for the /deleteTicket.php endpoint. This includes adding anti-CSRF tokens that are validated on the server side for all state-changing requests. Additionally, enforcing same-site cookies and validating the HTTP Referer header can provide supplementary protection. Access controls should be reviewed and strengthened to ensure that only authorized users can perform ticket deletions. Monitoring and logging of ticket deletion requests should be enhanced to detect anomalous or automated activity. If possible, restrict the HTTP methods allowed on sensitive endpoints to POST only and consider implementing CAPTCHA or multi-factor authentication for critical operations. Since no official patches are currently available, organizations should consider isolating or restricting access to the vulnerable system until mitigations are in place. Regular security assessments and penetration testing should be conducted to verify the effectiveness of the applied controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ccbb7ef31ef0b5691af

Added to database: 2/25/2026, 9:42:35 PM

Last enriched: 2/26/2026, 7:30:44 AM

Last updated: 4/12/2026, 3:40:26 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses