CVE-2022-32007
📋 TL;DR
This SQL injection vulnerability in Complete Online Job Search System v1.0 allows attackers to execute arbitrary SQL commands via the 'id' parameter in the admin company edit page. This affects all organizations using this specific software version without proper input validation. Attackers could potentially access, modify, or delete database content.
💻 Affected Systems
- Complete Online Job Search System
📦 What is this software?
Complete Online Job Search System by Complete Online Job Search System Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining.
Likely Case
Unauthorized access to sensitive job seeker and employer data, including personal information and credentials.
If Mitigated
Limited impact with proper input validation, parameterized queries, and database permissions restricting damage scope.
🎯 Exploit Status
Exploit requires access to admin interface but SQL injection is straightforward via crafted 'id' parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Implement parameterized queries in /eris/admin/company/index.php and validate/sanitize all user inputs.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.
Input Validation Filter
allAdd server-side validation to only accept numeric values for the 'id' parameter.
Add PHP validation: if(!is_numeric($_GET['id'])) { die('Invalid input'); }
🧯 If You Can't Patch
- Restrict access to /eris/admin/ directory using IP whitelisting or authentication requirements.
- Implement database user with minimal permissions (read-only if possible) for the application.
🔍 How to Verify
Check if Vulnerable:
Test /eris/admin/company/index.php?view=edit&id=1' with SQL injection payloads and observe error responses or unexpected behavior.
Check Version:
Check software version in admin panel or configuration files.
Verify Fix Applied:
Attempt SQL injection tests and verify they are blocked or produce no database errors.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in web server logs
- Multiple requests to /eris/admin/company/index.php with suspicious 'id' parameters
Network Indicators:
- HTTP requests containing SQL keywords (UNION, SELECT, etc.) in URL parameters
SIEM Query:
source="web_logs" AND uri_path="/eris/admin/company/index.php" AND (query_string="*id=*'*" OR query_string="*id=*%27*")