CVE-2020-28994

9.8 CRITICAL

📋 TL;DR

An unauthenticated SQL injection vulnerability in Karenderia Multiple Restaurant System allows attackers to execute arbitrary SQL commands on the database. This affects all versions 5.4.2 and below, potentially enabling complete database compromise including data theft, modification, or deletion.

💻 Affected Systems

Products:
  • Karenderia Multiple Restaurant System
Versions: 5.4.2 and below
Operating Systems: Any OS running PHP/MySQL
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configurations are vulnerable. The system must be internet-facing or accessible to attackers to be exploited.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including theft of all customer data, financial information, and administrative credentials, followed by system takeover or ransomware deployment.

🟠

Likely Case

Data exfiltration of sensitive information (customer PII, payment details, credentials) and potential defacement or modification of restaurant content.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and input validation are in place, though SQL injection attempts may still be logged.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists showing SQL injection vectors. Attack requires no authentication and uses simple SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.3 or later

Vendor Advisory: https://gist.github.com/wes4m/e32080b02c2cd668d50eeac66613ca1d

Restart Required: No

Instructions:

1. Backup database and application files. 2. Download latest version from official source. 3. Replace vulnerable files with patched version. 4. Test functionality. 5. Monitor for any issues.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block malicious requests

Input Validation Filter

all

Implement application-level input validation for all user inputs

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement network segmentation to limit database access

🔍 How to Verify

Check if Vulnerable:

Check version number in admin panel or system configuration files. If version is 5.4.2 or below, system is vulnerable.

Check Version:

Check admin panel or examine system configuration files for version information

Verify Fix Applied:

Verify version is 5.4.3 or later. Test SQL injection attempts should be blocked or properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts from single IP
  • Suspicious database queries in MySQL logs

Network Indicators:

  • SQL injection patterns in HTTP requests
  • Unusual outbound database connections
  • High volume of requests to vulnerable endpoints

SIEM Query:

source="web_logs" AND ("' OR" OR "UNION SELECT" OR "--" OR ";--") AND uri="*/karenderia/*"

🔗 References

📤 Share & Export