CVE-2026-5847
Information Disclosure via SQL Injection in Movie Ticketing System
Publication date: 2026-04-09
Last updated on: 2026-04-09
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-5847 is a vulnerability in the Movie Ticketing System PHP version 1.0 where a SQL database backup file named "moviedb.sql" is stored in a publicly accessible directory under the web root.
Because the web server does not restrict access to .sql files, any remote attacker can directly access and download the full database dump without authentication.
This exposed SQL dump contains the entire database structure and sensitive data such as user accounts, booking information, administrative credentials, email addresses, and personal information.
The root cause is insecure server configuration and improper handling of backup files, including storing backups inside the web root, allowing direct access to .sql files, and lacking access control or authentication.
How can this vulnerability impact me? :
This vulnerability can lead to sensitive information disclosure, allowing attackers to obtain user credentials, administrative access, and personal data.
Attackers can exploit this to compromise user accounts, perform credential reuse attacks, gain unauthorized administrative access, manipulate or delete data, and further exploit the application.
Since the attack can be launched remotely without authentication, it poses a significant risk to the confidentiality and integrity of the system and its users.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the SQL database backup file "moviedb.sql" is accessible via a web browser or HTTP requests without authentication.
You can attempt to access the file directly using commands like:
- curl -I http://<your-server>/movie/db/moviedb.sql
- wget --spider http://<your-server>/movie/db/moviedb.sql
- curl http://<your-server>/movie/db/moviedb.sql
If these commands return the SQL dump file or HTTP status 200 without requiring authentication, the vulnerability is present.
Additionally, scanning your web server directories for exposed .sql files or using web vulnerability scanners to detect exposed backup files can help identify this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include removing the backup SQL files from any web-accessible directories to prevent direct access.
You should store backup files in secure, non-web-accessible locations such as /var/backups/.
Configure your web server to deny access to .sql files. For example:
- For Apache: <Files "*.sql"> Require all denied </Files>
- For Nginx: location ~* \.sql$ { deny all; }
Also, disable directory listing on the web server and ensure strict file permissions limit access to authorized administrators only.
Conduct regular security audits to detect and prevent such exposures in the future.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability leads to sensitive information disclosure by exposing a full SQL database backup file containing user accounts, administrative credentials, email addresses, and personal information. This exposure can result in unauthorized access to personal data, which directly impacts compliance with data protection regulations such as GDPR and HIPAA.
Under GDPR, unauthorized disclosure of personal data violates principles of data confidentiality and security, potentially leading to legal penalties and mandatory breach notifications. Similarly, HIPAA requires safeguarding protected health information, and such exposure would constitute a breach of patient data confidentiality.
The root cause is insecure server configuration and improper backup file handling, which are considered security misconfigurations under OWASP Top 10 (A05:2021). Remediation steps such as removing backup files from web root, restricting access, and securing backups are essential to maintain compliance with these standards.