Exploit
CVE-2024-9789

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)

Published: Oct 10, 2024 / Updated: 40d ago

010
CVSS 5.1EPSS 0.05%Medium
CVE info copied to clipboard

Summary

A critical vulnerability has been identified in LyLme_spage version 1.9.5. The issue affects the processing of the file /admin/apply.php, where manipulation of the 'id' argument can lead to SQL injection. This vulnerability can be exploited remotely and does not require user interaction.

Impact

This SQL injection vulnerability could allow an attacker to execute arbitrary SQL commands on the underlying database. Given the CVSS v3.1 base score of 7.2 (High severity) and the impacts rated as HIGH for confidentiality, integrity, and availability, successful exploitation could lead to unauthorized access to sensitive data, modification or deletion of database contents, and potential disruption of the application's functionality. The attack vector being NETWORK means it can be exploited remotely, increasing its severity.

Exploitation

One proof-of-concept exploit is available on shikangsi.com. There is no evidence of proof of exploitation at the moment.

Patch

As of the latest information provided, no official patch has been released. The vendor was contacted about this disclosure but did not respond, which may indicate that a patch is not yet available.

Mitigation

1. Implement input validation and parameterized queries to prevent SQL injection attacks. 2. Apply the principle of least privilege to database accounts used by the application. 3. Use web application firewalls (WAF) to filter malicious input. 4. Regularly monitor and audit database activities for suspicious queries. 5. Keep the LyLme_spage application and all associated components up to date with the latest security patches when they become available. 6. Consider temporarily disabling or restricting access to the affected /admin/apply.php file if possible without disrupting critical functionality.

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9789. See article

Oct 10, 2024 at 2:11 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 10, 2024 at 2:11 PM
CVE Assignment

NVD published the first details for CVE-2024-9789

Oct 10, 2024 at 2:15 PM
CVSS

A CVSS base score of 4.7 has been assigned.

Oct 10, 2024 at 2:21 PM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.4%)

Oct 11, 2024 at 10:19 AM
CVSS

A CVSS base score of 7.2 has been assigned.

Oct 17, 2024 at 2:31 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Oct 17, 2024 at 5:12 PM
Static CVE Timeline Graph

Affected Systems

Lylme/lylme_spage
+null more

Exploits

https://wiki.shikangsi.com/post/share/9c237d56-972e-40b4-9656-a1083ed84702
+null more

Attack Patterns

CAPEC-108: Command Line Execution through SQL Injection
+null more

News

CVE-2024-9789 Exploit
CVE Id : CVE-2024-9789 Published Date: 2024-10-17T14:26:00+00:00 A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. This issue affects some unknown processing of the file /admin/apply.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. inTheWild added a link to an exploit: https://wiki.shikangsi.com/post/share/9c237d56-972e-40b4-9656-a1083ed84702
CVE Alert: CVE-2024-9789 - https://www. redpacketsecurity.com/cve_aler t_cve-2024-9789/ # OSINT # ThreatIntel # CyberSecurity # cve_2024_9789
CVE-2024-9789
Gravedad 3.1 (CVSS 3.1 Base Score) Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
NA - CVE-2024-9789 - A vulnerability was found in LyLme_spage 1.9.5...
A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. This issue affects some unknown processing of the file /admin/apply.php. The manipulation of the argument id leads to sql...
Critical Vulnerability in LyLme spage 1.9.5 Allows Remote SQL Injection
LyLme - MEDIUM - CVE-2024-9789 A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. This issue affects some unknown processing of the file /admin/apply.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
See 7 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI