CVE-2023-49543

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass access controls in Book Store Management System v1, enabling them to access administrative pages and functions without credentials. Any system running the vulnerable version is affected, potentially allowing complete system compromise.

💻 Affected Systems

Products:
  • Book Store Management System
Versions: Version 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the PHP CodeIgniter 3 implementation from sourcecodester.com

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control, modify/delete data, install backdoors, or pivot to other systems.

🟠

Likely Case

Unauthorized data access, privilege escalation, and system configuration changes by attackers.

🟢

If Mitigated

Proper authentication and authorization controls prevent unauthorized access entirely.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication from the internet.
🏢 Internal Only: HIGH - Even internal attackers can exploit this without credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains exploit details and demonstration

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider implementing proper access controls or replacing the software.

🔧 Temporary Workarounds

Implement Proper Authentication Middleware

all

Add authentication checks before accessing any administrative endpoints

Modify PHP controllers to include session validation and role checks

Restrict Access via Web Server

linux

Use .htaccess or web server configuration to restrict access to admin paths

Order deny,allow
Deny from all
Allow from 192.168.1.0/24 # Example internal network

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement a Web Application Firewall (WAF) with authentication bypass rules

🔍 How to Verify

Check if Vulnerable:

Attempt to access /admin or administrative endpoints without authentication

Check Version:

Check project files for version information or readme

Verify Fix Applied:

Verify authentication is required for all administrative functions

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to admin endpoints
  • Multiple failed login attempts followed by successful admin access

Network Indicators:

  • Direct access to admin URLs without authentication headers

SIEM Query:

source="web_logs" AND (url="*/admin*" OR url="*/dashboard*") AND NOT (user!="" OR session_id!="")

🔗 References

📤 Share & Export