A critical vulnerability has been discovered in the Movie Ticket Booking System, classified as CVE-2022-4247. This vulnerability affects an unknown code within the file booking.php and can lead to SQL Injection through the manipulation of the argument 'id'. The attack can be initiated remotely, and the exploit details have been publicly disclosed, meaning attackers can potentially take advantage of this vulnerability. The identifier associated with this vulnerability is VDB-214624.


The Movie Ticket Booking System provides a convenient platform for users to search, reserve, and purchase movie tickets online. Ensuring the security of such platforms is essential as they manage sensitive user information, such as personal details and payment information.


The vulnerability lies within the handling of the argument 'id' in the file booking.php. By manipulating this argument, a remote attacker can execute arbitrary SQL commands on the web application, potentially accessing sensitive information or modifying the underlying database.

The following code snippet demonstrates the issue

// booking.php

$id = $_GET['id'];
$sql = "SELECT * FROM tickets WHERE id = '$id'";
$result = mysqli_query($conn, $sql);

In the above code, the '$id' variable is retrieved directly from the user-supplied input ($_GET['id']), which makes the SQL query susceptible to injection. An attacker can easily insert a malicious SQL payload, such as "1' OR '1'='1", into the 'id' argument, essentially bypassing any access control mechanisms in place.


As mentioned earlier, the exploit has been publicly disclosed and is described in various online security forums and vulnerability databases. We highly recommend referring to the original references provided below for a more in-depth understanding of the exploit.

1. Vulnerability Database (VDB) Entry: 214624
2. Exploit-DB: Movie Ticket Booking System - SQL Injection


To mitigate this vulnerability, we recommend implementing proper input validation and parameterized SQL queries. For instance, using prepared statements with the MySQLi extension in PHP can help prevent attackers from successfully injecting SQL commands. The following code example demonstrates how to properly use prepared statements with the MySQLi extension:

// booking.php (updated)

$id = $_GET['id'];
$stmt = $conn->prepare("SELECT * FROM tickets WHERE id = ?");
$stmt->bind_param("i", $id);
$result = $stmt->get_result();


In conclusion, the discovery of the CVE-2022-4247 vulnerability in the Movie Ticket Booking System highlights the importance of secure coding practices and regularly auditing web applications for potential security risks. By addressing this vulnerability promptly and implementing the recommended mitigation steps, the Movie Ticket Booking System can protect its users' sensitive information and maintain a safe online environment.


Published on: 12/01/2022 08:15:00 UTC
Last modified on: 12/02/2022 18:14:00 UTC