CVE-2026-5847
Received Received - Intake
Information Disclosure via SQL Injection in Movie Ticketing System

Publication date: 2026-04-09

Last updated on: 2026-04-09

Assigner: VulDB

Description
A vulnerability has been found in code-projects Movie Ticketing System 1.0. Impacted is an unknown function of the file /db/moviedb.sql of the component SQL Database Backup File Handler. Such manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5847 is a vulnerability in the Movie Ticketing System PHP version 1.0 where a SQL database backup file named "moviedb.sql" is stored in a publicly accessible directory under the web root.

Because the web server does not restrict access to .sql files, any remote attacker can directly access and download the full database dump without authentication.

This exposed SQL dump contains the entire database structure and sensitive data such as user accounts, booking information, administrative credentials, email addresses, and personal information.

The root cause is insecure server configuration and improper handling of backup files, including storing backups inside the web root, allowing direct access to .sql files, and lacking access control or authentication.


How can this vulnerability impact me? :

This vulnerability can lead to sensitive information disclosure, allowing attackers to obtain user credentials, administrative access, and personal data.

Attackers can exploit this to compromise user accounts, perform credential reuse attacks, gain unauthorized administrative access, manipulate or delete data, and further exploit the application.

Since the attack can be launched remotely without authentication, it poses a significant risk to the confidentiality and integrity of the system and its users.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the SQL database backup file "moviedb.sql" is accessible via a web browser or HTTP requests without authentication.

You can attempt to access the file directly using commands like:

  • curl -I http://<your-server>/movie/db/moviedb.sql
  • wget --spider http://<your-server>/movie/db/moviedb.sql
  • curl http://<your-server>/movie/db/moviedb.sql

If these commands return the SQL dump file or HTTP status 200 without requiring authentication, the vulnerability is present.

Additionally, scanning your web server directories for exposed .sql files or using web vulnerability scanners to detect exposed backup files can help identify this issue.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing the backup SQL files from any web-accessible directories to prevent direct access.

You should store backup files in secure, non-web-accessible locations such as /var/backups/.

Configure your web server to deny access to .sql files. For example:

  • For Apache: <Files "*.sql"> Require all denied </Files>
  • For Nginx: location ~* \.sql$ { deny all; }

Also, disable directory listing on the web server and ensure strict file permissions limit access to authorized administrators only.

Conduct regular security audits to detect and prevent such exposures in the future.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability leads to sensitive information disclosure by exposing a full SQL database backup file containing user accounts, administrative credentials, email addresses, and personal information. This exposure can result in unauthorized access to personal data, which directly impacts compliance with data protection regulations such as GDPR and HIPAA.

Under GDPR, unauthorized disclosure of personal data violates principles of data confidentiality and security, potentially leading to legal penalties and mandatory breach notifications. Similarly, HIPAA requires safeguarding protected health information, and such exposure would constitute a breach of patient data confidentiality.

The root cause is insecure server configuration and improper backup file handling, which are considered security misconfigurations under OWASP Top 10 (A05:2021). Remediation steps such as removing backup files from web root, restricting access, and securing backups are essential to maintain compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart