CVE-2018-6367

9.8 CRITICAL

📋 TL;DR

This CVE describes a SQL injection vulnerability in Vastal I-Tech Buddy Zone Facebook Clone 2.9.9 that allows attackers to execute arbitrary SQL commands via the request_id parameter in /chat_im/chat_window.php or the category parameter in /search_events.php. Attackers can potentially access, modify, or delete database content. Anyone running this specific version of the Facebook Clone software is affected.

💻 Affected Systems

Products:
  • Vastal I-Tech Buddy Zone Facebook Clone
Versions: Version 2.9.9
Operating Systems: Any OS running PHP/MySQL
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PHP/MySQL environment. Vulnerable in default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, data destruction, or full system takeover through SQL injection leading to remote code execution.

🟠

Likely Case

Unauthorized access to sensitive user data (personal information, messages, credentials), database manipulation, or denial of service.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available. Simple SQL injection requiring no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for request_id and category parameters.

Modify chat_window.php and search_events.php to use prepared statements with parameterized queries

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns in request parameters.

Configure WAF to detect and block SQL injection patterns in GET/POST parameters

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system
  • Deploy intrusion detection/prevention systems to monitor for SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Test the vulnerable endpoints with SQL injection payloads: /chat_im/chat_window.php?request_id=1' OR '1'='1 or /search_events.php?category=1' OR '1'='1

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Test with the same payloads after implementing parameterized queries - should return error or no SQL execution.

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in application logs
  • Unusual database queries from web application
  • Multiple failed login attempts or parameter manipulation

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) in parameters
  • Unusual traffic patterns to vulnerable endpoints

SIEM Query:

web.url:*chat_window.php* AND (web.param:*OR* OR web.param:*UNION* OR web.param:*SELECT*)

🔗 References

📤 Share & Export