CVE-2024-22922
📋 TL;DR
CVE-2024-22922 is a privilege escalation vulnerability in Projectworlds Visitor Management System in PHP v1.0 that allows remote attackers to gain administrative access via a crafted script to the login page. This affects all organizations using the vulnerable version of this visitor management software.
💻 Affected Systems
- Projectworlds Visitor Management System in PHP
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with administrative access, allowing attacker to modify visitor records, access sensitive data, or use the system as a foothold for further attacks.
Likely Case
Unauthorized administrative access to the visitor management system, enabling manipulation of visitor logs and system settings.
If Mitigated
Limited impact with proper network segmentation and access controls preventing lateral movement.
🎯 Exploit Status
Exploit requires sending crafted POST request to /index.php. Public proof-of-concept available on GitHub.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://projectworlds.com
Restart Required: No
Instructions:
No official patch available. Check vendor website for updates or consider alternative software.
🔧 Temporary Workarounds
Web Application Firewall Rule
allBlock suspicious POST requests to /index.php containing privilege escalation patterns
WAF-specific configuration required
Access Restriction
linuxRestrict access to the visitor management system to trusted IP addresses only
iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP
🧯 If You Can't Patch
- Isolate the system on a separate network segment with strict access controls
- Implement multi-factor authentication and monitor for suspicious login attempts
🔍 How to Verify
Check if Vulnerable:
Check if running Projectworlds Visitor Management System in PHP version 1.0. Review web server logs for suspicious POST requests to /index.php.
Check Version:
Check application files for version information or review installation documentation
Verify Fix Applied:
Test with the public PoC to confirm system no longer vulnerable. Monitor for successful exploitation attempts.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /index.php with crafted parameters
- Multiple failed login attempts followed by successful admin login from same IP
Network Indicators:
- HTTP POST requests to /index.php with suspicious parameter values
- Traffic patterns indicating privilege escalation attempts
SIEM Query:
source="web_logs" AND uri="/index.php" AND method="POST" AND (param="admin" OR param="privilege" OR param="escalation")