CVE-2024-11077

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Job Recruitment 1.0 allows attackers to manipulate database queries through the email parameter in /index.php. Attackers can potentially read, modify, or delete database contents remotely. All users running Job Recruitment 1.0 are affected.

💻 Affected Systems

Products:
  • Job Recruitment
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable. No specific configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including credential theft, data destruction, and potential remote code execution via database functions

🟠

Likely Case

Data exfiltration of user information, job postings, and administrative credentials

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-sensitive data

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available on GitHub. SQL injection via email parameter requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize email parameter input

Modify /index.php to validate email format and escape SQL special characters

Web Application Firewall Rule

all

Block SQL injection patterns in email parameter

Add WAF rule to detect and block SQL injection attempts in POST/GET parameters

🧯 If You Can't Patch

  • Implement network segmentation to isolate Job Recruitment system from critical infrastructure
  • Enable detailed logging of all database queries and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Test email parameter with SQL injection payloads like ' OR '1'='1

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Test with same payloads to ensure proper input validation and error handling

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from web server
  • SQL syntax errors in application logs
  • Multiple failed login attempts with SQL patterns

Network Indicators:

  • HTTP requests with SQL keywords in email parameter
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND (email="*' OR*" OR email="*UNION*" OR email="*SELECT*" OR email="*INSERT*")

🔗 References

📤 Share & Export