CVE-2018-17843
📋 TL;DR
This CVE describes a critical SQL injection vulnerability in multiple MLM software products from ADD Clicking. Attackers can exploit parameters in member scripts to execute arbitrary SQL commands, potentially compromising the entire database. All users running affected MLM software versions 1.0 are vulnerable.
💻 Affected Systems
- ADD Clicking MLM Software
- Binary MLM Software
- Level MLM Software
- Singleleg MLM Software
- Autopool MLM Software
- Investment MLM Software
- Bidding MLM Software
- Moneyorder MLM Software
- Repurchase MLM Software
- Gift MLM Software
📦 What is this software?
Autopool Mlm Software by Mlmsoftwarez
Bidding Mlm Software by Mlmsoftwarez
Binary Mlm Software by Mlmsoftwarez
Gift Mlm Software by Mlmsoftwarez
Level Mlm Software by Mlmsoftwarez
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution via database functions.
Likely Case
Unauthorized data access, user information theft, and potential privilege escalation within the MLM system.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
Exploit requires member-level access but SQL injection is straightforward once authenticated. Public exploit code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
No official patch available. Implement workarounds or migrate to alternative software.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd input validation and parameterized queries to vulnerable PHP files
Edit member/readmsg.php, member/tree.php, and member/downline.php to use prepared statements with PDO or mysqli
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns
Configure WAF to block requests containing SQL keywords in msg_id, pid, or m_id parameters
🧯 If You Can't Patch
- Isolate the MLM software behind a reverse proxy with strict input filtering
- Implement network segmentation to limit database access from the application server
🔍 How to Verify
Check if Vulnerable:
Test vulnerable endpoints with SQL injection payloads: member/readmsg.php?msg_id=1' OR '1'='1, member/tree.php?pid=1' OR '1'='1, member/downline.php?m_id=1' OR '1'='1
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Attempt SQL injection tests after implementing parameterized queries and verify they no longer succeed
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in application logs
- Multiple failed login attempts followed by parameter manipulation
- Requests with SQL keywords in msg_id, pid, or m_id parameters
Network Indicators:
- Unusual database connection patterns from application server
- Large data transfers from database to unexpected sources
SIEM Query:
source="web_logs" AND (msg_id="*' OR*" OR pid="*' OR*" OR m_id="*' OR*")