CVE-2023-6414

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Voovi Social Networking Script version 1.0 allows remote attackers to execute arbitrary SQL queries via the id and user parameters in perfil.php. Successful exploitation could lead to complete database compromise, exposing all application data including user credentials and sensitive information. All deployments of Voovi Social Networking Script version 1.0 are affected.

💻 Affected Systems

Products:
  • Voovi Social Networking Script
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable by default. The vulnerability exists in the perfil.php file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, authentication bypass, privilege escalation, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized access to sensitive user data, credential theft, and potential account takeover.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The vulnerability requires no authentication and exploitation is straightforward for attackers with basic SQL knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script

Restart Required: No

Instructions:

1. Check vendor advisory for patch availability. 2. If no patch exists, implement parameterized queries in perfil.php. 3. Replace direct user input concatenation with prepared statements. 4. Validate and sanitize all user inputs.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious requests.

Input Validation Filter

all

Implement server-side input validation to reject suspicious characters in id and user parameters.

🧯 If You Can't Patch

  • Isolate the vulnerable system from the internet and restrict access to trusted networks only.
  • Implement strict network segmentation and monitor all database queries for suspicious patterns.

🔍 How to Verify

Check if Vulnerable:

Test perfil.php with SQL injection payloads in id and user parameters (e.g., ' OR '1'='1). Monitor for database errors or unexpected responses.

Check Version:

Check script version in configuration files or admin panel. For Voovi, examine version.php or similar version indicator files.

Verify Fix Applied:

Attempt SQL injection tests after remediation. Verify no database errors or data leaks occur with malicious inputs.

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in application logs
  • Unusual database query patterns from perfil.php
  • Multiple failed login attempts following SQL injection patterns

Network Indicators:

  • HTTP requests to perfil.php with SQL keywords in parameters
  • Unusual database response sizes

SIEM Query:

source="web_logs" AND uri="/perfil.php" AND (param="id" OR param="user") AND (value="' OR" OR value="UNION" OR value="SELECT" OR value="--")

🔗 References

📤 Share & Export