Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
A critical vulnerability has been identified in the Restaurant Reservation System version 1.0 developed by code-projects. The vulnerability affects an unknown part of the file /updatebal.php. The issue stems from improper neutralization of special elements used in SQL commands, commonly known as SQL injection. This vulnerability allows for remote exploitation without requiring user interaction or privileges.
This SQL injection vulnerability can have severe consequences. Attackers can potentially: 1. Access, modify, or delete sensitive data in the database 2. Execute administrative operations on the database 3. Issue commands to the operating system 4. Retrieve and manipulate customer reservation data 5. Compromise the integrity of the entire reservation system The high impact on confidentiality, integrity, and availability indicates that attackers could gain unauthorized access to sensitive information, alter critical data, and potentially disrupt the system's operations.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
As of the latest information provided, there is no mention of an available patch for this vulnerability. The affected software is Restaurant Reservation System version 1.0 by code-projects.
While awaiting a patch, consider the following mitigation strategies: 1. Implement input validation and sanitization for all user inputs, especially in the /updatebal.php file. 2. Use parameterized queries or prepared statements to prevent SQL injection. 3. Apply the principle of least privilege to database accounts used by the application. 4. Implement Web Application Firewall (WAF) rules to detect and block SQL injection attempts. 5. Regularly audit and monitor database activities for any suspicious queries. 6. If possible, temporarily disable or restrict access to the vulnerable /updatebal.php file until a fix is available. 7. Keep the Restaurant Reservation System and all associated components up-to-date with the latest security patches when they become available.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-9360. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-9360
A CVSS base score of 7.3 has been assigned.
EPSS Score was set to: 0.05% (Percentile: 16.3%)
A CVSS base score of 9.8 has been assigned.