CVE-2024-1100

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Vadi Corporate Information Systems DIGIKENT GIS allows attackers to execute arbitrary SQL commands on the database. It affects all versions up to 2.23.5, potentially compromising sensitive data and system integrity.

💻 Affected Systems

Products:
  • Vadi Corporate Information Systems DIGIKENT GIS
Versions: through 2.23.5
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: All installations up to version 2.23.5 are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, authentication bypass, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permissions restricting unauthorized access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with basic web security testing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-24-0589

Restart Required: No

Instructions:

1. Monitor vendor for patch release. 2. Apply patch when available. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Implement Web Application Firewall

all

Deploy WAF with SQL injection rules to block malicious requests

Database Access Restrictions

all

Limit database user permissions to minimum required

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement input validation and parameterized queries in application code

🔍 How to Verify

Check if Vulnerable:

Check application version against affected range (≤2.23.5)

Check Version:

Check application interface or configuration files for version information

Verify Fix Applied:

Verify version is >2.23.5 after patch application

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL-like patterns

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.)
  • Unusual database connection patterns

SIEM Query:

web_requests WHERE url CONTAINS 'UNION' OR url CONTAINS 'SELECT' OR url CONTAINS 'OR 1=1'

🔗 References

📤 Share & Export