CVE-2024-10700

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in University Event Management System 1.0 allows attackers to manipulate database queries through the submit.php file. Remote attackers can potentially access, modify, or delete sensitive data in the database. Organizations using this software are affected.

💻 Affected Systems

Products:
  • University Event Management System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects submit.php file with multiple parameters (name, email, title, Year, gender, fromdate, todate, people) vulnerable to SQL injection.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, authentication bypass, and potential system takeover via SQL injection leading to remote code execution.

🟠

Likely Case

Unauthorized access to sensitive event data, user information, and potential database manipulation or deletion.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or minor data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details publicly available on GitHub, remote attack vector, no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Implement parameterized queries and input validation in submit.php.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and sanitization for all parameters in submit.php

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting submit.php parameters

🧯 If You Can't Patch

  • Isolate the system from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor all database access attempts

🔍 How to Verify

Check if Vulnerable:

Test submit.php with SQL injection payloads in name/email/title/Year/gender/fromdate/todate/people parameters

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Verify parameterized queries are implemented and test with SQL injection payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts after SQL injection attempts
  • Error messages containing SQL syntax in web logs

Network Indicators:

  • Unusual POST requests to submit.php with SQL keywords
  • Multiple parameter manipulation attempts

SIEM Query:

source="web_logs" AND uri="/submit.php" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "INSERT" OR request_body CONTAINS "DELETE")

🔗 References

📤 Share & Export