CVE-2024-27515

7.2 HIGH

📋 TL;DR

CVE-2024-27515 is a SQL injection vulnerability in Osclass 5.1.2 that allows attackers to execute arbitrary SQL commands through crafted inputs. This affects all Osclass installations running version 5.1.2, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • Osclass
Versions: 5.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Osclass 5.1.2 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized data access, data exfiltration, and potential authentication bypass through database manipulation.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place, potentially only error-based information disclosure.

🌐 Internet-Facing: HIGH - Osclass is typically deployed as a web application accessible from the internet, making it directly exploitable by remote attackers.
🏢 Internal Only: MEDIUM - Internal systems running Osclass could be exploited by authenticated users or through other compromised systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized, and the public GitHub issue provides technical details that could be used to create exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.3 or later

Vendor Advisory: https://github.com/mindstellar/Osclass/issues/495

Restart Required: No

Instructions:

1. Backup your Osclass installation and database. 2. Download the latest Osclass version from the official repository. 3. Replace all files with the updated version. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for all user-supplied parameters before database queries

Modify PHP files to add parameterized queries using prepared statements

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules

Configure WAF to block SQL injection patterns

🧯 If You Can't Patch

  • Implement network segmentation to isolate Osclass server from critical systems
  • Enable detailed SQL query logging and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check if Osclass version is 5.1.2 by examining the version file or admin panel

Check Version:

Check oc_version.php file or admin panel at /oc-admin/index.php?page=tools&action=version

Verify Fix Applied:

Verify Osclass version is 5.1.3 or later and test input fields for SQL injection

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed login attempts with SQL syntax
  • Long or unusual parameter values in access logs

Network Indicators:

  • HTTP requests containing SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_access.log" AND ("UNION" OR "SELECT" OR "INSERT" OR "UPDATE" OR "DELETE" OR "DROP" OR "--" OR "' OR '1'='1")

🔗 References

📤 Share & Export