CVE-2022-32018
📋 TL;DR
CVE-2022-32018 is an SQL injection vulnerability in Complete Online Job Search System v1.0 that allows attackers to execute arbitrary SQL commands via the search parameter. This affects all deployments of this specific software version. Attackers could potentially access, modify, or delete database content.
💻 Affected Systems
- Complete Online Job Search System
📦 What is this software?
Complete Online Job Search System by Complete Online Job Search System Project
⚠️ Risk & Real-World Impact
Worst Case
Full database compromise including credential theft, data exfiltration, and complete system takeover via privilege escalation.
Likely Case
Unauthorized data access and potential data manipulation of job listings, user information, and system configurations.
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-sensitive data.
🎯 Exploit Status
Exploit requires no authentication and is simple to execute via crafted HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Implement input validation and parameterized queries manually.
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rule
allBlock SQL injection patterns in the search parameter
WAF-specific configuration to block patterns like UNION, SELECT, INSERT, DELETE, DROP in /eris/index.php?q=hiring&search=
Input Validation Filter
linuxSanitize search parameter input in PHP
$search = filter_var($_GET['search'], FILTER_SANITIZE_STRING);
🧯 If You Can't Patch
- Isolate the system behind a reverse proxy with strict input filtering
- Implement database user with minimal permissions (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test with payload: /eris/index.php?q=hiring&search=' OR '1'='1
Check Version:
Check application version in admin panel or source code comments
Verify Fix Applied:
Verify that SQL injection payloads no longer return unexpected data or errors
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in web server logs
- Multiple requests with SQL keywords in search parameter
Network Indicators:
- HTTP requests containing SQL injection patterns to vulnerable endpoint
SIEM Query:
source="web_logs" AND uri="/eris/index.php" AND (query="*UNION*" OR query="*SELECT*" OR query="*OR '1'='1*")