Exploit
CVE-2024-8944

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)

Published: Sep 17, 2024 / Updated: 2mo ago

010
CVSS 6.9EPSS 0.05%Medium
CVE info copied to clipboard

Summary

A critical vulnerability has been discovered in the Hospital Management System version 1.0 developed by fabianros. The vulnerability affects an unknown part of the file check_availability.php. The issue stems from improper neutralization of special elements used in SQL commands, leading to SQL injection. This vulnerability can be exploited remotely and does not require user interaction.

Impact

The impact of this vulnerability is severe. With a CVSS v3.1 base score of 9.8 (Critical), it poses a significant risk to the confidentiality, integrity, and availability of the affected system. Attackers can potentially: 1. Gain unauthorized access to sensitive patient data, compromising patient privacy. 2. Modify or delete critical medical records, affecting the integrity of patient information. 3. Disrupt hospital operations by manipulating or deleting data in the database. 4. Escalate privileges within the system, potentially gaining full control over the hospital management infrastructure. 5. Use the compromised system as a stepping stone to attack other connected systems within the hospital network.

Exploitation

One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available for this vulnerability. The patch details can be found at https://vuldb.com/?ctiid.277761. It is crucial for the security team to apply this patch as soon as possible to mitigate the risk.

Mitigation

To mitigate this vulnerability, the following steps are recommended: 1. Apply the available patch immediately to the affected Hospital Management System version 1.0. 2. If immediate patching is not possible, consider temporarily disabling or restricting access to the affected file (check_availability.php) until the patch can be applied. 3. Implement input validation and parameterized queries to prevent SQL injection attacks. 4. Use the principle of least privilege for database accounts used by the application. 5. Regularly audit and monitor database activities for any suspicious queries or unauthorized access attempts. 6. Implement a Web Application Firewall (WAF) to help filter out malicious SQL injection attempts. 7. Conduct a thorough security review of the entire Hospital Management System to identify and address any similar vulnerabilities. 8. Provide security awareness training to developers to prevent similar vulnerabilities in future updates or new applications.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-8944. See article

Sep 17, 2024 at 1:05 PM / VulDB Recent Entries
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 17, 2024 at 1:05 PM
CVE Assignment

NVD published the first details for CVE-2024-8944

Sep 17, 2024 at 6:15 PM
CVSS

A CVSS base score of 7.3 has been assigned.

Sep 17, 2024 at 6:52 PM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.3%)

Sep 18, 2024 at 9:32 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Sep 23, 2024 at 5:00 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 23, 2024 at 7:10 PM
Threat Intelligence Report

CVE-2024-8944 is a critical SQL injection vulnerability in Hospital Management System 1.0, with a CVSS score of 9.8, that allows remote attackers to manipulate the email argument in check_availability.php, potentially leading to significant exploitation following its public disclosure. The details provided do not specify whether the vulnerability is actively exploited in the wild, nor do they mention any proof-of-concept exploits, mitigations, detections, or patches available. There is also no information regarding downstream impacts on other third-party vendors or technologies. See article

Sep 27, 2024 at 5:36 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 28, 2024 at 9:33 PM / nvd
Static CVE Timeline Graph

Affected Systems

Fabianros/hospital_management_system
+null more

Exploits

https://github.com/65241/cve/issues/1
+null more

Patches

vuldb.com
+null more

Attack Patterns

CAPEC-108: Command Line Execution through SQL Injection
+null more

References

@RISK: The Consensus Security Vulnerability Alert: Vol. 24, Num. 38 - SANS Institute
Product: Apache HugeGraph-Server CVSS Score: 0 ** KEV since 2024-09-18 ** NVD: ISC Podcast: CVE-2024-7120 - Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90 are vulnerable to critical os command injection via manipulation of the argument template in the Web Interface component's list_base_config.php file, allowing for remote attacks with publicly disclosed exploit potential (VDB-272451). Product: Ivanti Endpoint Manager Cloud Services Appliance CVSS Score: 9.1 ** KEV since 2024-09-19 ** NVD: ISC Podcast: NVD References: CVE-2024-9043 - Cellopoint's Secure Email Gateway is vulnerable to buffer overflow in authentication allowing remote attackers to crash the process and gain admin privileges.

News

Update Sat Sep 28 22:28:19 UTC 2024
Update Sat Sep 28 22:28:19 UTC 2024
Update Sat Sep 28 14:32:32 UTC 2024
Update Sat Sep 28 14:32:32 UTC 2024
@RISK: The Consensus Security Vulnerability Alert: Vol. 24, Num. 38 - SANS Institute
Product: Apache HugeGraph-Server CVSS Score: 0 ** KEV since 2024-09-18 ** NVD: ISC Podcast: CVE-2024-7120 - Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90 are vulnerable to critical os command injection via manipulation of the argument template in the Web Interface component's list_base_config.php file, allowing for remote attacks with publicly disclosed exploit potential (VDB-272451). Product: Ivanti Endpoint Manager Cloud Services Appliance CVSS Score: 9.1 ** KEV since 2024-09-19 ** NVD: ISC Podcast: NVD References: CVE-2024-9043 - Cellopoint's Secure Email Gateway is vulnerable to buffer overflow in authentication allowing remote attackers to crash the process and gain admin privileges.
CVE-2024-8944 Exploit
CVE Id : CVE-2024-8944 Published Date: 2024-09-23T16:56:00+00:00 A vulnerability, which was classified as critical, was found in code-projects Hospital Management System 1.0. This affects an unknown part of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. inTheWild added a link to an exploit: https://github.com/65241/cve/issues/1
NA - CVE-2024-8944 - A vulnerability, which was classified as...
A vulnerability, which was classified as critical, was found in code-projects Hospital Management System 1.0. This affects an unknown part of the file check_availability.php. The manipulation of...
See 3 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI