Exploit
CVE-2024-9788

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)

Published: Oct 10, 2024 / Updated: 40d ago

010
CVSS 5.1EPSS 0.05%Medium
CVE info copied to clipboard

Summary

A critical vulnerability has been discovered in LyLme_spage version 1.9.5. The vulnerability affects unknown code in the file /admin/tag.php. The issue stems from improper handling of the 'id' argument, which can lead to SQL injection. This vulnerability can be exploited remotely and does not require user interaction.

Impact

The impact of this vulnerability is severe. If exploited, an attacker could potentially: 1. Gain unauthorized access to the database 2. Modify or delete data in the database 3. Execute arbitrary SQL commands 4. Potentially escalate privileges and gain control over the system 5. Compromise the confidentiality, integrity, and availability of the affected system The CVSS v3.1 base score is 7.2 (High), with high impacts on confidentiality, integrity, and availability. This indicates that successful exploitation could result in a significant breach of security.

Exploitation

One proof-of-concept exploit is available on shikangsi.com. There is no evidence of proof of exploitation at the moment.

Patch

As of the latest information provided, no official patch has been released. The vendor was contacted about this vulnerability but did not respond. It's crucial for the security team to monitor for any updates or patches from the vendor.

Mitigation

Given the severity of the vulnerability and the lack of an official patch, the following mitigation steps are recommended: 1. Immediately isolate or disable the affected system if possible. 2. Implement strict input validation for the 'id' parameter in /admin/tag.php. 3. Use prepared statements or parameterized queries to prevent SQL injection. 4. Apply the principle of least privilege to database accounts used by the application. 5. Monitor system logs for any suspicious activities or potential exploitation attempts. 6. Consider implementing a Web Application Firewall (WAF) to help filter malicious requests. 7. Regularly update and patch the LyLme_spage software as soon as fixes become available. 8. Conduct a thorough security audit of the entire application to identify any similar vulnerabilities.

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9788. See article

Oct 10, 2024 at 2:11 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 10, 2024 at 2:11 PM
CVE Assignment

NVD published the first details for CVE-2024-9788

Oct 10, 2024 at 2:15 PM
CVSS

A CVSS base score of 4.7 has been assigned.

Oct 10, 2024 at 2:21 PM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.4%)

Oct 11, 2024 at 10:19 AM
CVSS

A CVSS base score of 7.2 has been assigned.

Oct 17, 2024 at 2:31 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Oct 17, 2024 at 5:12 PM
Static CVE Timeline Graph

Affected Systems

Lylme/lylme_spage
+null more

Exploits

https://wiki.shikangsi.com/post/share/9c237d56-972e-40b4-9656-a1083ed84702
+null more

Attack Patterns

CAPEC-108: Command Line Execution through SQL Injection
+null more

News

CVE-2024-9788 Exploit
CVE Id : CVE-2024-9788 Published Date: 2024-10-17T14:26:00+00:00 A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. This vulnerability affects unknown code of the file /admin/tag.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. inTheWild added a link to an exploit: https://wiki.shikangsi.com/post/share/9c237d56-972e-40b4-9656-a1083ed84702
CVE Alert: CVE-2024-9788 - https://www. redpacketsecurity.com/cve_aler t_cve-2024-9788/ # OSINT # ThreatIntel # CyberSecurity # cve_2024_9788
CVE-2024-9788
Gravedad 3.1 (CVSS 3.1 Base Score) A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical.
NA - CVE-2024-9788 - A vulnerability has been found in LyLme_spage...
A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. This vulnerability affects unknown code of the file /admin/tag.php. The manipulation of the argument id leads to sql...
Critical SQL Injection Vulnerability Found in LyLme Spage 1.9.5
LyLme - MEDIUM - CVE-2024-9788 A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. This vulnerability affects unknown code of the file /admin/tag.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
See 7 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI