CVE-2023-46787
📋 TL;DR
Online Matrimonial Project v1.0 contains unauthenticated SQL injection vulnerabilities in the auth/auth.php resource. Attackers can execute arbitrary SQL commands without authentication, potentially compromising the entire database. All deployments of this specific version are affected.
💻 Affected Systems
- Online Matrimonial Project
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, authentication bypass, and potential remote code execution via database functions.
Likely Case
Database information disclosure, user credential theft, and potential privilege escalation.
If Mitigated
Limited impact with proper input validation and database permissions, though SQL injection attempts would still be logged.
🎯 Exploit Status
SQL injection via username parameter requires no authentication and uses simple payloads.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://projectworlds.in
Restart Required: No
Instructions:
No official patch available. Implement parameterized queries and input validation in auth/auth.php.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns in the username parameter
Input Validation
allAdd server-side validation to reject SQL special characters in username field
🧯 If You Can't Patch
- Isolate the application behind a reverse proxy with strict input filtering
- Implement database user with minimal permissions (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test auth/auth.php with SQL injection payloads in username parameter (e.g., admin' OR '1'='1)
Check Version:
Check project documentation or source code for version information
Verify Fix Applied:
Verify that SQL injection payloads no longer work and return proper error handling
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in application logs
- Multiple failed login attempts with SQL special characters
Network Indicators:
- HTTP POST requests to auth/auth.php containing SQL keywords in parameters
SIEM Query:
source="web_logs" AND uri="/auth/auth.php" AND (param="username" AND value MATCHES "[';]|OR|UNION|SELECT")