CVE-2018-25167
Description
Net-Billetterie 2.9 contains an SQL injection vulnerability in the login parameter of login.inc.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit malicious SQL code through the login POST parameter to extract database information including usernames, passwords, and system credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Net-Billetterie 2.9 has an unauthenticated SQL injection in login.inc.php allowing attackers to extract database credentials.
The vulnerability is a SQL injection in the login parameter of login.inc.php. The application directly concatenates user-supplied input into a SQL query without sanitization, as seen in the source code [1]. Additionally, the use of extract($_POST) exposes other variables to user control, increasing the attack surface.
Attackers can exploit this by sending a crafted POST request to login.inc.php with a malicious login value. No authentication is required. The injection allows arbitrary SQL queries, including UNION-based extraction of data from the database.
The impact is significant: an attacker can retrieve sensitive data such as usernames, MD5 password hashes, and other system credentials. This could lead to account takeover or further compromise of the application.
The vulnerability affects Net-Billetterie version 2.9. As of the CVE publication date, no official patch has been released; users are advised to implement input validation or upgrade if a fixed version becomes available. The exploit is publicly available [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.