CVE-2023-36311

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in PHPJabbers Document Creator v1.0 allows attackers to execute arbitrary SQL commands via the 'column' parameter in index.php. This affects all users running the vulnerable version, potentially leading to data theft, modification, or complete system compromise.

💻 Affected Systems

Products:
  • PHPJabbers Document Creator
Versions: v1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of v1.0 regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized database access allowing data theft, modification of documents, and potential administrative account takeover.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via GET parameter requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.phpjabbers.com/document-creator

Restart Required: No

Instructions:

1. Check vendor website for updates
2. If no patch available, implement workarounds
3. Consider replacing with alternative software

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize the 'column' parameter before processing

Modify index.php to validate column parameter using preg_match('/^[a-zA-Z0-9_]+$/', $_GET['column']) or similar

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Implement strict input validation for all user-supplied parameters
  • Restrict database user permissions to minimum required

🔍 How to Verify

Check if Vulnerable:

Test index.php with malicious column parameter like: index.php?column=1' OR '1'='1

Check Version:

Check PHPJabbers Document Creator version in admin panel or configuration files

Verify Fix Applied:

Test with same payload after implementing fixes - should return error or sanitized response

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in logs
  • Multiple requests with SQL keywords in parameters
  • Requests to index.php with suspicious column values

Network Indicators:

  • HTTP requests containing SQL injection patterns in GET parameters
  • Unusual database query patterns from web server

SIEM Query:

source="web_logs" AND (uri="*index.php*" AND query="*column=*'*" OR query="*column=*%27*")

🔗 References

📤 Share & Export