CVE-2022-32006

7.2 HIGH

📋 TL;DR

Badminton Center Management System v1.0 contains a SQL injection vulnerability in the admin services view page. Attackers can exploit this to execute arbitrary SQL commands, potentially compromising the database. This affects all installations of the vulnerable software version.

💻 Affected Systems

Products:
  • Badminton Center Management System
Versions: v1.0
Operating Systems: Any OS running PHP/MySQL web server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin panel access, but SQL injection can bypass authentication if chained with other vulnerabilities.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, privilege escalation, and potential administrative account takeover.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin access to reach the vulnerable endpoint, but SQL injection payloads are well-documented and easy to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Implement parameterized queries in /bcms/admin/services/view_service.php to sanitize the 'id' parameter.

🔧 Temporary Workarounds

Web Application Firewall

all

Deploy WAF with SQL injection rules to block malicious requests

Input Validation

all

Add server-side validation to ensure 'id' parameter contains only numeric values

🧯 If You Can't Patch

  • Restrict access to /bcms/admin/ directory to trusted IP addresses only
  • Implement database user with minimal privileges (read-only for this function)

🔍 How to Verify

Check if Vulnerable:

Test /bcms/admin/services/view_service.php?id=1' OR '1'='1 to see if SQL error appears

Check Version:

Check software version in admin panel or readme files

Verify Fix Applied:

Test with same payload after fix - should return proper error handling without SQL errors

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in web server logs
  • Unusual database queries from web application user

Network Indicators:

  • HTTP requests to vulnerable endpoint with SQL keywords in parameters

SIEM Query:

web.url:*view_service.php* AND (web.param.id:*OR* OR web.param.id:*UNION* OR web.param.id:*SELECT*)

🔗 References

📤 Share & Export