CVE-2018-18757

9.8 CRITICAL

📋 TL;DR

CVE-2018-18757 is a SQL injection vulnerability in Open Faculty Evaluation System 5.6 for PHP 5.6 that allows attackers to execute arbitrary SQL commands via submit_feedback.php. This affects organizations using this specific educational software version, potentially exposing sensitive student and faculty data.

💻 Affected Systems

Products:
  • Open Faculty Evaluation System
Versions: 5.6 for PHP 5.6
Operating Systems: Any OS running PHP 5.6
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the submit_feedback.php endpoint. Different from CVE-2018-18758 which affects a different component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, or full system takeover via SQL injection to execute arbitrary commands.

🟠

Likely Case

Unauthorized access to sensitive student/faculty data, grade manipulation, or system disruption.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID: 45703), making this easily exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement proper input validation and parameterized queries in submit_feedback.php

Modify submit_feedback.php to use prepared statements with PDO or mysqli

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns

Configure WAF to block SQL injection patterns targeting submit_feedback.php

🧯 If You Can't Patch

  • Restrict network access to the evaluation system to trusted IPs only
  • Implement database user with minimal privileges for the application

🔍 How to Verify

Check if Vulnerable:

Check if running Open Faculty Evaluation System 5.6 for PHP 5.6 and test submit_feedback.php endpoint for SQL injection vulnerabilities.

Check Version:

Check system documentation or configuration files for version information

Verify Fix Applied:

Test submit_feedback.php with SQL injection payloads to ensure they are blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or unusual parameter values in web server logs for submit_feedback.php

Network Indicators:

  • SQL injection patterns in HTTP requests to submit_feedback.php

SIEM Query:

source="web_server" AND uri="*submit_feedback.php*" AND (param="*' OR *" OR param="*;--*" OR param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*UPDATE*")

🔗 References

📤 Share & Export