Exploit
CVE-2024-9086

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)

Published: Sep 22, 2024 / Updated: 58d ago

010
CVSS 5.3EPSS 0.05%Medium
CVE info copied to clipboard

Summary

A critical vulnerability has been discovered in code-projects Restaurant Reservation System version 1.0. The vulnerability affects an unknown function in the /filter.php file. By manipulating the 'from' and 'to' arguments, an attacker can perform SQL injection. This vulnerability can be exploited remotely, and public exploit code is available.

Impact

This SQL injection vulnerability could allow an attacker to execute arbitrary SQL commands on the underlying database. Given the CVSS v3.1 score of 9.8 (Critical), the potential impacts are severe: 1. Data Breach: Attackers could potentially access, modify, or delete sensitive information stored in the database, including customer details and reservation data. 2. System Compromise: Depending on the database configuration, attackers might be able to execute operating system commands, potentially leading to full system compromise. 3. Data Integrity: Unauthorized modifications to the database could result in incorrect reservations, financial discrepancies, or other operational issues. 4. Service Disruption: Malicious SQL queries could overload the database, causing denial of service and disrupting the reservation system's functionality. The vulnerability is particularly concerning due to its network attack vector, low attack complexity, and the fact that it requires no privileges or user interaction to exploit.

Exploitation

One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.

Patch

As of the latest information provided, there is no mention of an available patch for this vulnerability in Restaurant Reservation System 1.0. Users of this software should contact code-projects for update information and mitigation strategies.

Mitigation

Until a patch is available, consider the following mitigation strategies: 1. Input Validation: Implement strict input validation for the 'from' and 'to' parameters in the /filter.php file. 2. Parameterized Queries: Use parameterized SQL queries or prepared statements to prevent SQL injection. 3. Least Privilege: Ensure the database user account used by the application has minimal necessary privileges. 4. Web Application Firewall (WAF): Deploy a WAF to help filter out malicious requests. 5. Network Segmentation: If possible, place the database server in a separate network segment with restricted access. 6. Monitoring: Implement robust logging and monitoring to detect potential exploitation attempts. 7. Consider Temporary Workaround: If feasible, temporarily disable or restrict access to the /filter.php file until a proper fix is in place.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9086. See article

Sep 22, 2024 at 9:04 PM / Vulnerability Database 🛡
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 22, 2024 at 9:04 PM
CVE Assignment

NVD published the first details for CVE-2024-9086

Sep 22, 2024 at 9:15 PM
CVSS

A CVSS base score of 6.3 has been assigned.

Sep 22, 2024 at 9:20 PM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.3%)

Sep 23, 2024 at 9:27 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Sep 26, 2024 at 3:30 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 26, 2024 at 5:10 PM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 28, 2024 at 9:36 PM / nvd
Static CVE Timeline Graph

Affected Systems

Code-projects/restaurant_reservation_system
+null more

Exploits

https://github.com/ppp-src/a/issues/20
+null more

Attack Patterns

CAPEC-108: Command Line Execution through SQL Injection
+null more

News

CVE-2024-9086 Exploit
CVE Id : CVE-2024-9086 Published Date: 2024-09-26T15:26:00+00:00 A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument from/to leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "from" to be affected. But it must be assumed that parameter "to" is affected as well. inTheWild added a link to an exploit:
CVE Alert: CVE-2024-9086 - https://www.redpacketsecurity.com/cve_alert_cve-2024-9086/ #OSINT #ThreatIntel #CyberSecurity #cve_2024_9086
CVE Alert: CVE-2024-9086 - redpacketsecurity.com/cve_al… #OSINT #ThreatIntel #CyberSecurity #cve_2024_9086
CVE Alert: CVE-2024-9086
Affected Endpoints: No affected endpoints listed.
NA - CVE-2024-9086 - A vulnerability classified as critical has been...
A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument...
CVE-2024-9086
Critical Severity Description A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument from/to leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "from" to be affected. But it must be assumed that parameter "to" is affected as well. Read more at https://www.tenable.com/cve/CVE-2024-9086
See 9 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI