CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226052.
AnalysisAI
A SQL injection vulnerability exists in Campcodes Online Traffic Offense Management System version 1.0 within the /classes/Master.php file, where the 'id' parameter is not properly sanitized, allowing authenticated attackers to execute arbitrary SQL queries remotely. An attacker with valid credentials can leverage this vulnerability to read, modify, or delete database contents, potentially compromising sensitive traffic offense records. Public proof-of-concept code is available, increasing real-world exploitation risk.
Technical ContextAI
The vulnerability is a classic SQL injection (CWE-89) flaw in a PHP-based web application built by Campcodes (CPE: cpe:2.3:a:campcodes:online_traffic_offense_management_system:1.0:*:*:*:*:*:*:*). The /classes/Master.php file processes user-supplied input in the 'id' parameter without implementing parameterized queries or input validation, allowing attackers to inject malicious SQL syntax. The PHP application likely uses direct string concatenation or unescaped variable interpolation in SQL statement construction, enabling attackers to break out of intended query context and execute unintended database operations. This is a fundamental input validation failure at the application layer.
RemediationAI
Immediate action should be to contact Campcodes for security patches or updates; if unavailable, consider discontinuing use of version 1.0 or migrating to alternative traffic management systems. As a temporary mitigation, implement database-level access controls restricting the application account to minimal required permissions, deploy a Web Application Firewall (WAF) configured to detect and block SQL injection patterns in the 'id' parameter, and audit all database access logs for suspicious queries. Enforce network segmentation to limit access to the application to trusted administrative users only. Apply parameterized query patching to /classes/Master.php if source code review is feasible internally.
Share
External POC / Exploit Code
Leaving vuln.today