CVE-2022-31993

9.8 CRITICAL

📋 TL;DR

Badminton Center Management System v1.0 contains a SQL injection vulnerability in the delete_service function that allows attackers to execute arbitrary SQL commands. This affects all installations of the vulnerable software version. Attackers can potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • Badminton Center Management System
Versions: v1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of v1.0 regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, authentication bypass, and potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized data access and manipulation, potentially leading to business disruption and data breach.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in GitHub repository. SQL injection via GET parameter is trivial to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Implement parameterized queries and input validation in /bcms/classes/Master.php delete_service function.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block malicious requests

Input Validation Filter

all

Add input validation to sanitize parameters before processing

Add parameter validation in Master.php before SQL execution

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement network segmentation to limit database access from web server

🔍 How to Verify

Check if Vulnerable:

Test /bcms/classes/Master.php?f=delete_service with SQL injection payloads like ' OR '1'='1

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Verify parameterized queries are implemented and test with SQL injection payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web logs
  • Multiple requests to delete_service endpoint with suspicious parameters

Network Indicators:

  • SQL keywords in HTTP GET parameters
  • Unusual database connection patterns

SIEM Query:

web.url:*Master.php?f=delete_service* AND (web.param:*OR* OR web.param:*UNION* OR web.param:*SELECT*)

🔗 References

📤 Share & Export