Description
Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the hosting_id parameter. Attackers can send GET requests to the rooms/ajax_refresh_subtotal endpoint with malicious hosting_id values to extract sensitive database information or cause denial of service.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Ahmet Ümit BAYRAM
References
www.exploit-db.com/exploits/46616 (ExploitDB-46616)
www.doditsolutions.com/airbnb-clone-script/ (Homey BNB (Airbnb Clone Script) - Doditsolutions)
www.vulncheck.com/...b-sql-injection-via-ajaxrefreshsubtotal (VulnCheck Advisory: Homey BNB V4 SQL Injection via ajax_refresh_subtotal)