CVE-2020-11545
📋 TL;DR
CVE-2020-11545 is a critical SQL injection vulnerability in Project Worlds Official Car Rental System 1 that allows attackers to execute arbitrary SQL commands. This enables database dumping and authentication bypass, affecting all users running this vulnerable software.
💻 Affected Systems
- Project Worlds Official Car Rental System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the database including sensitive customer data, financial records, and administrative credentials, potentially leading to data theft, system takeover, and compliance violations.
Likely Case
Unauthorized access to the system, extraction of user credentials and personal information, and potential manipulation of booking data.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only allowing information disclosure without system compromise.
🎯 Exploit Status
Multiple SQL injection points exist in account.php, login.php, and book_car.php files, making exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Replace vulnerable code with parameterized queries or prepared statements
2. Implement proper input validation and sanitization
3. Update all SQL queries to use parameter binding
4. Test thoroughly before deployment
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy a WAF to block SQL injection attempts
Input Validation Filter
allImplement server-side input validation to reject suspicious characters
🧯 If You Can't Patch
- Isolate the system from the internet and restrict access to trusted networks only
- Implement strict database permissions and use principle of least privilege for database accounts
🔍 How to Verify
Check if Vulnerable:
Test the vulnerable endpoints (account.php, login.php, book_car.php) with SQL injection payloads like ' OR '1'='1
Check Version:
Check the software version in the application interface or configuration files
Verify Fix Applied:
Attempt SQL injection attacks against patched endpoints and verify they are rejected or properly handled
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts with SQL-like patterns
- Unexpected database queries
Network Indicators:
- HTTP requests containing SQL keywords to vulnerable endpoints
- Unusual database connection patterns
SIEM Query:
source="web_logs" AND (uri="*account.php*" OR uri="*login.php*" OR uri="*book_car.php*") AND (message="*SQL*" OR message="*syntax*" OR message="*union*" OR message="*select*" OR message="*or 1=1*")