CVE-2024-25350

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical SQL injection vulnerability in the Zoo Management System 1.0 by PHPGurukul. Attackers can inject malicious SQL commands through the tickettype and tprice parameters in the edit-ticket.php admin interface, potentially allowing unauthorized database access and manipulation. Organizations using this specific software version are affected.

💻 Affected Systems

Products:
  • PHPGurukul Zoo Management System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to /zms/admin/edit-ticket.php endpoint with vulnerable parameters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to remote code execution.

🟠

Likely Case

Unauthorized access to sensitive data including user credentials, financial information, and administrative controls.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin access to the vulnerable endpoint. Public proof-of-concept demonstrates SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Implement workarounds or replace software.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation and sanitization for tickettype and tprice parameters before processing.

Modify edit-ticket.php to validate and sanitize user inputs using PHP functions like mysqli_real_escape_string() or prepared statements.

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Configure WAF to block requests containing SQL keywords (SELECT, UNION, etc.) in tickettype and tprice parameters.

🧯 If You Can't Patch

  • Restrict network access to the Zoo Management System admin interface using firewall rules.
  • Implement strong authentication controls and monitor for unusual database query patterns.

🔍 How to Verify

Check if Vulnerable:

Test the /zms/admin/edit-ticket.php endpoint with SQL injection payloads in tickettype or tprice parameters and observe database errors or unexpected behavior.

Check Version:

Check software version in system configuration or about page.

Verify Fix Applied:

Verify that SQL injection attempts no longer produce database errors or unauthorized data access.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts followed by SQL injection patterns
  • Database error messages containing user input

Network Indicators:

  • HTTP requests to /zms/admin/edit-ticket.php with SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/zms/admin/edit-ticket.php" AND (param="tickettype" OR param="tprice") AND (content="SELECT" OR content="UNION" OR content="OR 1=1")

🔗 References

📤 Share & Export