CVE-2023-1674
📋 TL;DR
This is a critical SQL injection vulnerability in SourceCodester School Registration and Fee System 1.0 that allows attackers to manipulate database queries via the username parameter in the login.php file. Attackers can potentially steal sensitive data, modify database contents, or gain unauthorized access. Any organization using this specific software version is affected.
💻 Affected Systems
- SourceCodester School Registration and Fee System
📦 What is this software?
School Registration And Fee System by School Registration And Fee System Project
View all CVEs affecting School Registration And Fee System →
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data manipulation, authentication bypass, and potential remote code execution if database permissions allow.
Likely Case
Unauthorized access to sensitive student/financial data, credential theft, and potential system takeover.
If Mitigated
Limited impact with proper input validation, parameterized queries, and network segmentation in place.
🎯 Exploit Status
Public exploit available on GitHub. Attack requires no authentication and is simple to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Consider implementing manual fixes or replacing the software.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd server-side validation to sanitize username input and implement parameterized queries.
Modify /bilal final/login.php to use prepared statements with parameterized queries
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns in POST requests to login.php
Configure WAF to block SQL injection patterns in POST parameters
🧯 If You Can't Patch
- Isolate the system behind a firewall with strict access controls
- Implement network segmentation to limit database access
🔍 How to Verify
Check if Vulnerable:
Test the login.php endpoint with SQL injection payloads in the username parameter
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Verify that parameterized queries are implemented and SQL injection attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL syntax in username field
- Multiple failed login attempts with SQL patterns
- Database error messages in application logs
Network Indicators:
- POST requests to /bilal final/login.php containing SQL keywords
- Unusual database connection patterns
SIEM Query:
source="web_logs" AND uri="/bilal final/login.php" AND (username CONTAINS "' OR" OR username CONTAINS "UNION" OR username CONTAINS "SELECT")
🔗 References
- https://github.com/saintone98/bug_report/blob/main/vendors/hemedy99/School%20Registration%20and%20Fee%20System/SQLi-1.md
- https://vuldb.com/?ctiid.224231
- https://vuldb.com/?id.224231
- https://github.com/saintone98/bug_report/blob/main/vendors/hemedy99/School%20Registration%20and%20Fee%20System/SQLi-1.md
- https://vuldb.com/?ctiid.224231
- https://vuldb.com/?id.224231