CVE-2024-24100

8.3 HIGH

📋 TL;DR

Code-projects Computer Book Store 1.0 contains a SQL injection vulnerability in the PublisherID parameter that allows attackers to execute arbitrary SQL commands. This affects all installations of this specific software version. Attackers could potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • Code-projects Computer Book Store
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, and potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized data access and extraction of sensitive information from the database.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via PublisherID parameter is straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Implement parameterized queries and input validation in the source code.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious requests.

Input Validation

all

Implement strict input validation for PublisherID parameter to only accept expected values.

🧯 If You Can't Patch

  • Isolate the application behind a reverse proxy with SQL injection filtering
  • Implement network segmentation to limit database access from the application server

🔍 How to Verify

Check if Vulnerable:

Test PublisherID parameter with SQL injection payloads like ' OR '1'='1

Check Version:

Check application version in admin panel or configuration files.

Verify Fix Applied:

Verify that parameterized queries are implemented and SQL injection payloads are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts via PublisherID parameter

Network Indicators:

  • SQL keywords in HTTP requests to PublisherID parameter
  • Unusual database query patterns

SIEM Query:

SELECT * FROM web_logs WHERE uri LIKE '%PublisherID%' AND (request LIKE '%OR%' OR request LIKE '%UNION%' OR request LIKE '%SELECT%')

🔗 References

📤 Share & Export