CVE-2022-28093
📋 TL;DR
This vulnerability allows attackers to include local PHP files in SCBS Online Sports Venue Reservation System v1.0, potentially leading to arbitrary code execution. Attackers can upload crafted PHP files and then include them through the vulnerable functionality. All users running version 1.0 of this system are affected.
💻 Affected Systems
- SCBS Online Sports Venue Reservation System
📦 What is this software?
Online Sports Complex Booking System by Online Sports Complex Booking System Project
View all CVEs affecting Online Sports Complex Booking System →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the web server, accessing sensitive data, and potentially pivoting to other systems.
Likely Case
Remote code execution leading to data theft, website defacement, or installation of backdoors/malware.
If Mitigated
Limited impact with proper file upload restrictions and input validation preventing exploitation.
🎯 Exploit Status
Public GitHub repository contains detailed exploitation steps and proof-of-concept.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://scbs.com
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available or implementing workarounds.
🔧 Temporary Workarounds
Disable File Upload
allRemove or disable file upload functionality in the application
Input Validation
allImplement strict input validation to prevent path traversal and file inclusion
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block file inclusion attempts
- Restrict file uploads to specific directories with proper permissions
🔍 How to Verify
Check if Vulnerable:
Test if you can include local files through the application's file upload or parameter manipulation functionality
Check Version:
Check application version in admin panel or source code
Verify Fix Applied:
Attempt exploitation after implementing controls to confirm vulnerability is mitigated
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads
- Requests with path traversal patterns
- PHP file execution from unexpected locations
Network Indicators:
- HTTP requests with file inclusion patterns
- Unusual file upload traffic
SIEM Query:
web_requests WHERE (uri CONTAINS '..' OR uri CONTAINS 'php://' OR uri CONTAINS 'file://') AND src_ip NOT IN trusted_ips
🔗 References
- http://scbs.com
- https://github.com/wkeyi0x1/vul-report/blob/main/SCBS%20online%20sports%20venue%20reservation%20system/SCBS%20online%20sports%20venue%20reservation%20system%20v1.0%20-%20File%20Inclusion.md
- https://www.sourcecodester.com/php/15236/online-sports-complex-booking-system-phpmysql-free-source-code.html
- http://scbs.com
- https://github.com/wkeyi0x1/vul-report/blob/main/SCBS%20online%20sports%20venue%20reservation%20system/SCBS%20online%20sports%20venue%20reservation%20system%20v1.0%20-%20File%20Inclusion.md
- https://www.sourcecodester.com/php/15236/online-sports-complex-booking-system-phpmysql-free-source-code.html