CVE-2024-24014

9.8 CRITICAL

📋 TL;DR

A SQL injection vulnerability in Novel-Plus v4.3.0-RC1 and earlier allows attackers to execute arbitrary SQL commands by manipulating offset, limit, and sort parameters in the /novel/author/list endpoint. This can lead to data theft, modification, or deletion. All users running affected versions are impacted.

💻 Affected Systems

Products:
  • Novel-Plus
Versions: v4.3.0-RC1 and prior versions
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any deployment with the vulnerable endpoint accessible is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, or remote code execution via database functions.

🟠

Likely Case

Unauthorized access to sensitive data (user credentials, personal information, novel content) and potential data manipulation.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Upgrade to a patched version if available, or apply workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation for offset, limit, and sort parameters to reject malicious values.

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block SQL injection patterns targeting the /novel/author/list endpoint.

🧯 If You Can't Patch

  • Restrict access to the /novel/author/list endpoint using network ACLs or authentication.
  • Monitor logs for unusual SQL queries or parameter manipulation attempts.

🔍 How to Verify

Check if Vulnerable:

Test by sending crafted SQL injection payloads in offset, limit, or sort parameters to /novel/author/list and observe database errors or unexpected behavior.

Check Version:

Check the application version in its configuration or via the web interface.

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and are properly sanitized or rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in request parameters
  • Database error messages in logs
  • High volume of requests to /novel/author/list with suspicious parameters

Network Indicators:

  • HTTP requests with SQL keywords (e.g., UNION, SELECT, OR) in offset, limit, or sort parameters

SIEM Query:

source="web_logs" AND uri="/novel/author/list" AND (param="offset" OR param="limit" OR param="sort") AND (value="*UNION*" OR value="*SELECT*" OR value="*OR*" OR value="*--*")

🔗 References

📤 Share & Export