CVE-2017-17635

9.8 CRITICAL

📋 TL;DR

CVE-2017-17635 is a critical SQL injection vulnerability in MLM Forex Market Plan Script that allows attackers to execute arbitrary SQL commands via the newid parameter in news_detail.php or eventid parameter in event_detail.php. This affects all users running version 2.0.4 of the software. Attackers can potentially access, modify, or delete database content without authentication.

💻 Affected Systems

Products:
  • MLM Forex Market Plan Script
Versions: 2.0.4
Operating Systems: Any OS running PHP with database backend
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation. Requires PHP and MySQL/MariaDB database backend.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access and extraction of sensitive information including user credentials, financial data, and business records.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH - The vulnerable endpoints are typically exposed to the internet in web applications.
🏢 Internal Only: MEDIUM - Internal systems could still be exploited by malicious insiders or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available. Simple SQL injection requiring no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Check for updated version from vendor. 2. If no patch available, implement workarounds. 3. Replace vulnerable parameter handling with parameterized queries. 4. Validate and sanitize all user inputs.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation for newid and eventid parameters to only accept expected data types

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting news_detail.php and event_detail.php

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems from critical infrastructure
  • Deploy intrusion detection systems to monitor for SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Test news_detail.php?newid=1' OR '1'='1 and event_detail.php?eventid=1' OR '1'='1 for SQL error responses

Check Version:

Check script version in admin panel or configuration files

Verify Fix Applied:

Test with SQL injection payloads and verify no database errors or unexpected behavior occurs

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in web server logs
  • Unusual database queries from web application
  • Multiple failed parameter validation attempts

Network Indicators:

  • HTTP requests with SQL keywords in parameters
  • Abnormal request patterns to vulnerable endpoints

SIEM Query:

source="web_logs" AND (uri="*news_detail.php*" OR uri="*event_detail.php*") AND (param="*' OR *" OR param="*UNION*" OR param="*SELECT*" OR param="*INSERT*")

🔗 References

📤 Share & Export