CVE-2020-11545

9.8 CRITICAL

📋 TL;DR

CVE-2020-11545 is a critical SQL injection vulnerability in Project Worlds Official Car Rental System 1 that allows attackers to execute arbitrary SQL commands. This enables database dumping and authentication bypass, affecting all users running this vulnerable software.

💻 Affected Systems

Products:
  • Project Worlds Official Car Rental System
Versions: Version 1
Operating Systems: Any OS running PHP/MySQL
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the default installation with no specific configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the database including sensitive customer data, financial records, and administrative credentials, potentially leading to data theft, system takeover, and compliance violations.

🟠

Likely Case

Unauthorized access to the system, extraction of user credentials and personal information, and potential manipulation of booking data.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing information disclosure without system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple SQL injection points exist in account.php, login.php, and book_car.php files, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Replace vulnerable code with parameterized queries or prepared statements
2. Implement proper input validation and sanitization
3. Update all SQL queries to use parameter binding
4. Test thoroughly before deployment

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF to block SQL injection attempts

Input Validation Filter

all

Implement server-side input validation to reject suspicious characters

🧯 If You Can't Patch

  • Isolate the system from the internet and restrict access to trusted networks only
  • Implement strict database permissions and use principle of least privilege for database accounts

🔍 How to Verify

Check if Vulnerable:

Test the vulnerable endpoints (account.php, login.php, book_car.php) with SQL injection payloads like ' OR '1'='1

Check Version:

Check the software version in the application interface or configuration files

Verify Fix Applied:

Attempt SQL injection attacks against patched endpoints and verify they are rejected or properly handled

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL-like patterns
  • Unexpected database queries

Network Indicators:

  • HTTP requests containing SQL keywords to vulnerable endpoints
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND (uri="*account.php*" OR uri="*login.php*" OR uri="*book_car.php*") AND (message="*SQL*" OR message="*syntax*" OR message="*union*" OR message="*select*" OR message="*or 1=1*")

🔗 References

📤 Share & Export