CVE-2024-10337
📋 TL;DR
This critical SQL injection vulnerability in SourceCodeHero Clothes Recommendation System 1.0 allows remote attackers to execute arbitrary SQL commands via the /admin/home.php?con=add endpoint. Attackers can potentially access, modify, or delete database content. All users running version 1.0 without proper input validation are affected.
💻 Affected Systems
- SourceCodeHero Clothes Recommendation System
📦 What is this software?
Clothes Recommendation System by Clothes Recommendation System Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining
Likely Case
Unauthorized database access allowing extraction of sensitive information like user credentials, personal data, or system configuration
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-critical data
🎯 Exploit Status
Exploit details are publicly available and SQL injection is a well-understood attack vector
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
1. Check vendor website for updates 2. Apply any available patches 3. Test functionality after patching
🔧 Temporary Workarounds
Input Validation Filter
allAdd parameter validation to filter SQL injection attempts
Modify /admin/home.php to validate cat, subcat, t1, t2, text parameters
Web Application Firewall
allDeploy WAF with SQL injection protection rules
Configure WAF to block requests with SQL patterns in parameters
🧯 If You Can't Patch
- Restrict access to /admin/home.php endpoint using network controls or authentication
- Implement database user with minimal privileges (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test /admin/home.php?con=add endpoint with SQL injection payloads in cat/subcat/t1/t2/text parameters
Check Version:
Check application version in admin panel or configuration files
Verify Fix Applied:
Attempt SQL injection after implementing fixes and confirm requests are blocked or sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in application logs
- Multiple failed parameter validation attempts
Network Indicators:
- HTTP requests to /admin/home.php with SQL keywords in parameters
SIEM Query:
source="web_logs" AND uri="/admin/home.php" AND (param="*SELECT*" OR param="*UNION*" OR param="*OR*" OR param="*--*")