CVE-2019-25488
Published: 12 March 2026
Description
Jettweb Hazir Rent A Car Scripti V4 contains multiple SQL injection vulnerabilities in the admin panel that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into the 'tur', 'id', and 'ozellikdil' parameters of…
more
the admin/index.php endpoint to extract sensitive database information or cause denial of service.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of untrusted GET parameters like 'tur', 'id', and 'ozellikdil' to block SQL injection payloads before they reach the database.
Mandates identification, reporting, and correction of the specific SQL injection flaws in the admin/index.php endpoint to eliminate the vulnerability.
Boundary protection at web interfaces enables inspection and filtering of HTTP GET requests to block SQL injection attempts targeting the admin panel.
Security SummaryAI
CVE-2019-25488 affects Jettweb Hazir Rent A Car Scripti V4, a web application script, where multiple SQL injection vulnerabilities (CWE-89) exist in the admin panel. These flaws are present in the admin/index.php endpoint, allowing manipulation of database queries through unsanitized GET parameters including 'tur', 'id', and 'ozellikdil'. The vulnerability enables attackers to inject arbitrary SQL code, with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact, low integrity impact, and no availability impact.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges or user interaction required. By sending crafted HTTP GET requests to the vulnerable endpoint, they can extract sensitive database information, such as user credentials or other confidential data, or potentially cause denial of service through malicious queries.
Advisories and exploit details are documented in references including https://www.exploit-db.com/exploits/46614, which provides a proof-of-concept exploit, and https://www.vulncheck.com/advisories/jettweb-hazir-rent-a-car-scripti-v4-sql-injection-via-admin, detailing the SQL injection via the admin panel. No specific patches or mitigation steps are outlined in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in unauthenticated public-facing web application admin panel directly enables T1190 (Exploit Public-Facing Application) for remote exploitation and facilitates T1213.006 (Data from Databases) via arbitrary SQL query execution to extract sensitive data including user credentials.