CVE-2022-31991
📋 TL;DR
Badminton Center Management System v1.0 contains a SQL injection vulnerability in the delete_court function that allows attackers to execute arbitrary SQL commands. This affects all installations of the vulnerable software version. Attackers can potentially access, modify, or delete database content.
💻 Affected Systems
- Badminton Center Management System
📦 What is this software?
Badminton Center Management System by Badminton Center Management System Project
View all CVEs affecting Badminton Center Management System →
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining
Likely Case
Unauthorized data access, modification of court booking data, potential privilege escalation
If Mitigated
Limited impact if proper input validation and WAF rules are in place
🎯 Exploit Status
Public exploit details available in GitHub repository; SQL injection is straightforward to exploit
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider replacing with alternative software or implementing custom fixes.
🔧 Temporary Workarounds
Input Validation and Parameterized Queries
allImplement proper input validation and use parameterized queries in the delete_court function
Manual code modification required: Replace raw SQL with prepared statements
Web Application Firewall Rules
allBlock SQL injection patterns targeting the vulnerable endpoint
WAF-specific configuration to block patterns like UNION SELECT, OR 1=1, etc.
🧯 If You Can't Patch
- Isolate the system behind a reverse proxy with strict WAF rules
- Disable or restrict access to the vulnerable endpoint (/bcms/classes/Master.php?f=delete_court)
🔍 How to Verify
Check if Vulnerable:
Test the endpoint with SQL injection payloads: /bcms/classes/Master.php?f=delete_court&id=1' OR '1'='1
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Test with same payloads; should return error or no database interaction
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in web server logs
- Multiple requests to delete_court endpoint with special characters
Network Indicators:
- HTTP requests containing SQL keywords to vulnerable endpoint
- Unusual database query patterns
SIEM Query:
web.url:*delete_court* AND (web.query:*UNION* OR web.query:*OR 1=1* OR web.query:*'--*)