Exploit
CVE-2024-9087

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)

Published: Sep 22, 2024 / Updated: 58d ago

010
CVSS 6.9EPSS 0.05%Medium
CVE info copied to clipboard

Summary

A critical vulnerability has been discovered in Vehicle Management 1.0, specifically affecting an unknown part of the file /edit1.php. The vulnerability allows for SQL injection through the manipulation of the 'sno' argument. This is a remotely exploitable vulnerability, and the exploit has been publicly disclosed.

Impact

This SQL injection vulnerability can have severe consequences. Given its critical classification and high CVSS v3.1 base score of 9.8, the potential impacts are: 1. Data breach: Attackers can potentially extract sensitive information from the database, compromising confidentiality. 2. Data manipulation: The high integrity impact suggests attackers could alter or delete data in the database. 3. Service disruption: With a high availability impact, the vulnerability could be exploited to crash the database or make it inaccessible. 4. Privilege escalation: SQL injection can sometimes be leveraged to gain higher system privileges. 5. Remote code execution: In some cases, SQL injection can lead to executing arbitrary commands on the host system. One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.

Exploitation

One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.

Patch

As of the latest information provided, there is no mention of an available patch for this vulnerability in Vehicle Management 1.0. The security team should closely monitor for any updates or patches released by the vendor, Vehicle Management Project.

Mitigation

Given the critical nature of this vulnerability and the lack of a current patch, the following mitigation steps are recommended: 1. Immediate action: If possible, temporarily disable or restrict access to the vulnerable /edit1.php file until a patch is available. 2. Input validation: Implement strong input validation and sanitization for the 'sno' parameter and any other user inputs. 3. Parameterized queries: Use prepared statements or parameterized queries to prevent SQL injection. 4. Least privilege: Ensure the database user account used by the application has minimal necessary privileges. 5. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block SQL injection attempts. 6. Network segmentation: Limit network access to the affected system where possible. 7. Monitoring: Increase monitoring for unusual database queries or activities that might indicate exploitation attempts. 8. Update plan: Prepare for rapid deployment of a patch as soon as it becomes available from the vendor. 9. Version upgrade: Consider upgrading to a newer version of the software if available and not vulnerable. Given the high severity (CVSS v3.1 score 9.8) and public availability of the exploit, this vulnerability should be treated as a top priority for remediation efforts.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9087. See article

Sep 22, 2024 at 10:09 PM / CVE
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 22, 2024 at 10:10 PM
CVE Assignment

NVD published the first details for CVE-2024-9087

Sep 22, 2024 at 10:15 PM
CVSS

A CVSS base score of 7.3 has been assigned.

Sep 22, 2024 at 10:20 PM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.3%)

Sep 23, 2024 at 9:27 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Sep 26, 2024 at 3:20 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 26, 2024 at 5:10 PM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 28, 2024 at 9:36 PM / nvd
Static CVE Timeline Graph

Affected Systems

Vehicle_management_project/vehicle_management
+null more

Exploits

https://github.com/ppp-src/a/issues/19
+null more

Attack Patterns

CAPEC-108: Command Line Execution through SQL Injection
+null more

News

CVE-2024-9087 Exploit
CVE Id : CVE-2024-9087 Published Date: 2024-09-26T15:16:00+00:00 A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. inTheWild added a link to an exploit: https://github.com/ppp-src/a/issues/19
CVE Alert: CVE-2024-9087 - https://www. redpacketsecurity.com/cve_aler t_cve-2024-9087/ # OSINT # ThreatIntel # CyberSecurity # cve_2024_9087
NA - CVE-2024-9087 - A vulnerability, which was classified as...
A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads...
CVE-2024-9087
Critical Severity Description A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2024-9087
@VulmonFeeds 2024年09月23日 09時33分22秒
CVE-2024-9087 Critical SQL Injection in Vehicle Management 1.0 Exploited... https:// vulmon.com/vulnerabilityd etails?qid=CVE-2024-9087 … Don't wait vulnerability scanning results: https:// alerts.vulmon.com/?utm_source=tw itter&utm_medium=social&utm_campaign=2102281&utm_content=2 …
See 8 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI