Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
A critical vulnerability has been discovered in code-projects Student Record System version 1.0. The vulnerability affects an unknown functionality in the /index.php file, where manipulation of the 'regno' argument can lead to SQL injection. This vulnerability can be exploited remotely without requiring user interaction or special privileges.
The impact of this vulnerability is severe. It allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized access, data theft, data manipulation, or even complete system compromise. Given the CVSS v3.1 base score of 9.8 (Critical), this vulnerability poses a significant risk to the confidentiality, integrity, and availability of the affected system. Attackers could potentially access sensitive student records, modify grades, or disrupt the entire student record system.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
A patch has been made available for this vulnerability. Details about the patch can be found at the following URLs: 1. https://vuldb.com/?ctiid.278269 2. https://vuldb.com/?id.278269 3. https://vuldb.com/?submit.411912
To mitigate this vulnerability, the following steps are recommended: 1. Update the code-projects Student Record System to the latest patched version immediately. 2. If immediate patching is not possible, consider temporarily disabling the affected functionality in /index.php or restricting access to it. 3. Implement input validation and parameterized queries to prevent SQL injection attacks. 4. Use the principle of least privilege for database accounts used by the application. 5. Regularly monitor system logs for any suspicious activities or unauthorized access attempts. 6. Conduct a thorough security audit of the entire system to identify and address any similar vulnerabilities. 7. Implement a Web Application Firewall (WAF) to help detect and block SQL injection attempts.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-9091. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-9091
A CVSS base score of 7.3 has been assigned.
EPSS Score was set to: 0.05% (Percentile: 16.3%)
A CVSS base score of 9.8 has been assigned.