CVE-2024-0480
📋 TL;DR
This is a critical SQL injection vulnerability in Taokeyun software that allows remote attackers to execute arbitrary SQL commands via manipulated HTTP POST requests. The vulnerability affects the index function in the Drs.php file and can lead to data theft, modification, or deletion. All users running Taokeyun versions up to 1.0.5 are affected.
💻 Affected Systems
- Taokeyun
📦 What is this software?
Taokeyun by Jifeer
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data exfiltration, privilege escalation, and potential remote code execution if database functions allow it.
Likely Case
Unauthorized data access, modification of database contents, and potential authentication bypass.
If Mitigated
Limited impact with proper input validation and database permissions in place.
🎯 Exploit Status
Exploit code is publicly available on Packet Storm Security and other sources, making this easily exploitable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Consider upgrading to version 1.0.6 or later if released, or implement workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation and parameterized queries for the cid parameter in Drs.php
Web Application Firewall Rules
allDeploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint
🧯 If You Can't Patch
- Isolate the affected system from the internet and restrict access to trusted networks only
- Implement network segmentation and monitor all database access from the Taokeyun application
🔍 How to Verify
Check if Vulnerable:
Check if running Taokeyun version 1.0.5 or earlier and if the Drs.php file exists with the vulnerable index function
Check Version:
Check application configuration files or admin interface for version information
Verify Fix Applied:
Test the vulnerable endpoint with SQL injection payloads to confirm they are blocked or sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts or parameter manipulation in web logs
Network Indicators:
- SQL injection patterns in HTTP POST requests to the vulnerable endpoint
- Unusual database connections from web server
SIEM Query:
web_logs WHERE url CONTAINS 'application/index/controller/m/Drs.php' AND (request_body CONTAINS 'UNION' OR request_body CONTAINS 'SELECT' OR request_body CONTAINS 'OR 1=1')