Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
A critical vulnerability has been discovered in code-projects Restaurant Reservation System 1.0, affecting an unknown part of the file filter3.php. The vulnerability allows for SQL injection through the manipulation of the 'company' argument. This vulnerability can be exploited remotely without requiring user interaction or special privileges.
This SQL injection vulnerability can have severe consequences. Attackers could potentially: 1. Access, modify, or delete sensitive data in the database 2. Bypass authentication mechanisms 3. Execute administrative operations on the database 4. In some cases, issue commands to the operating system The CVSS v3.1 base score of 9.8 (Critical) indicates that this vulnerability has high impact on confidentiality, integrity, and availability of the system. It can be exploited over the network with low attack complexity, requiring no privileges or user interaction.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
As of the provided information, there is no mention of an available patch for this vulnerability.
While no specific patch is mentioned, the following mitigation strategies are recommended: 1. Update the Restaurant Reservation System to a newer version if available 2. Implement input validation and parameterized queries to prevent SQL injection 3. Apply the principle of least privilege to database accounts used by the application 4. Use web application firewalls (WAF) to filter malicious inputs 5. Regularly audit and monitor database activities for suspicious behavior 6. Consider temporarily disabling the affected functionality in filter3.php if possible until a patch is available
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-9811. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-9811
A CVSS base score of 7.3 has been assigned.
EPSS Score was set to: 0.05% (Percentile: 16.4%)
A CVSS base score of 9.8 has been assigned.