CVE-2023-6418

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Voovi Social Networking Script version 1.0 allows remote attackers to execute arbitrary SQL queries via the id parameter in videos.php. Successful exploitation could lead to complete database compromise, exposing all application data including user credentials and sensitive information. All deployments of Voovi Social Networking Script version 1.0 are affected.

💻 Affected Systems

Products:
  • Voovi Social Networking Script
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of version 1.0. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, authentication bypass, privilege escalation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized access to all database tables, extraction of user credentials and personal data, and potential application takeover.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via GET/POST parameter requires minimal technical skill. Public proof-of-concept exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script

Restart Required: No

Instructions:

1. Check vendor website for updated version. 2. If no patch available, implement input validation and parameterized queries. 3. Consider migrating to alternative software if vendor is unresponsive.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to ensure id parameter contains only numeric values

In videos.php, add: if(!is_numeric($_GET['id'])) { die('Invalid input'); }

Web Application Firewall Rule

all

Block SQL injection patterns targeting videos.php

WAF rule: Block requests to videos.php containing SQL keywords in id parameter

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system
  • Deploy a web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Test videos.php with SQL injection payloads like: videos.php?id=1' OR '1'='1

Check Version:

Check script version in admin panel or readme files

Verify Fix Applied:

Test with same payloads and verify they are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple requests to videos.php with suspicious id parameters
  • Database query errors containing SQL syntax

Network Indicators:

  • HTTP requests to videos.php containing SQL keywords (UNION, SELECT, etc.)
  • Abnormal database query patterns from application server

SIEM Query:

source="web_logs" AND uri="*videos.php*" AND (query="*UNION*" OR query="*SELECT*" OR query="*OR '1'='1*")

🔗 References

📤 Share & Export