CVE-2024-11632
📋 TL;DR
This critical SQL injection vulnerability in Simple Car Rental System 1.0 allows attackers to execute arbitrary SQL commands by manipulating parameters in the /book_car.php file. Attackers can potentially access, modify, or delete database contents, including sensitive customer information. Any organization using this vulnerable software is affected.
💻 Affected Systems
- Simple Car Rental System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining
Likely Case
Unauthorized access to sensitive customer data (names, contact info, payment details) and potential data manipulation
If Mitigated
Limited impact with proper input validation and database permissions, but still potential for information disclosure
🎯 Exploit Status
Exploit details publicly available; multiple parameters vulnerable (fname, id_no, gender, email, phone, location)
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing custom fixes with parameterized queries.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation and parameterized queries in /book_car.php
Edit /book_car.php to replace direct variable insertion with prepared statements
Web Application Firewall Rules
allDeploy WAF rules to block SQL injection patterns targeting book_car.php parameters
Configure WAF to block requests containing SQL keywords in fname, id_no, gender, email, phone, location parameters
🧯 If You Can't Patch
- Isolate the system behind a reverse proxy with strict input filtering
- Implement network segmentation to limit database access from the web server
🔍 How to Verify
Check if Vulnerable:
Test /book_car.php with SQL injection payloads in fname parameter (e.g., fname=' OR '1'='1)
Check Version:
Check software version in admin panel or readme files
Verify Fix Applied:
Verify that SQL injection attempts no longer succeed and parameterized queries are implemented
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in web server logs
- Multiple failed login attempts from single IP
- Requests with SQL keywords in parameters
Network Indicators:
- Unusual database queries from web server IP
- Large data exfiltration patterns
SIEM Query:
source="web_logs" AND (uri="/book_car.php") AND (param="fname" OR param="id_no" OR param="gender" OR param="email" OR param="phone" OR param="location") AND (keywords="UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "UPDATE" OR "DROP" OR "OR '1'='1")