CVE-2017-17892

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands through the 'chnlid' parameter in viewsubs.php or the 'search' parameter in search_video.php in Readymade Video Sharing Script. This affects all deployments of the vulnerable script versions, potentially exposing database contents and enabling further system compromise.

💻 Affected Systems

Products:
  • Readymade Video Sharing Script
Versions: All versions prior to patching (specific version range not documented)
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using the vulnerable script files. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, remote code execution, and full system takeover.

🟠

Likely Case

Database information disclosure, including user credentials, personal data, and administrative access.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-sensitive data.

🌐 Internet-Facing: HIGH - The vulnerable parameters are accessible via web requests, making internet-facing instances immediately exploitable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but require network access, reducing exposure to external attackers.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via URL parameters requires minimal technical skill. Public proof-of-concept demonstrates exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Replace vulnerable files with patched versions if available. 2. Manually implement parameterized queries or input validation. 3. Remove or disable vulnerable scripts if not needed.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to filter SQL injection attempts in vulnerable parameters

Modify viewsubs.php and search_video.php to sanitize chnlid and search parameters using preg_replace('/[^a-zA-Z0-9]/', '', $input)

Web Application Firewall Rule

all

Block SQL injection patterns at the WAF level

Add WAF rule to block requests containing SQL keywords in chnlid or search parameters

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system
  • Deploy a web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Test by appending SQL injection payloads to chnlid or search parameters (e.g., viewsubs.php?chnlid=1' OR '1'='1)

Check Version:

Check script version in admin panel or source code comments

Verify Fix Applied:

Attempt SQL injection tests and verify they are blocked or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in web server logs
  • Multiple requests with SQL keywords in parameters
  • Long parameter values in chnlid or search fields

Network Indicators:

  • HTTP requests containing SQL injection patterns in query strings
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (url="*viewsubs.php*" OR url="*search_video.php*") AND (query="*' OR*" OR query="*UNION*" OR query="*SELECT*" OR query="*INSERT*")

🔗 References

📤 Share & Export