CVE-2024-29731

9.8 CRITICAL

📋 TL;DR

SQL injection vulnerabilities in SportsNET version 4.0.1 allow attackers to execute arbitrary SQL queries through the checkBlindFields endpoint. This could lead to complete database compromise including data theft, modification, or deletion. Organizations using SportsNET 4.0.1 are affected.

💻 Affected Systems

Products:
  • SportsNET
Versions: 4.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the checkBlindFields endpoint with idChallenge and idEmpresa parameters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive data exfiltration, data destruction, and potential lateral movement to other systems.

🟠

Likely Case

Data theft of user information, challenge data, and enterprise records stored in the database.

🟢

If Mitigated

Limited impact if proper input validation and WAF rules block malicious queries.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited and this one appears to be straightforward based on the description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sportsnet

Restart Required: No

Instructions:

1. Check vendor website for patches. 2. If patch available, download and apply. 3. Test functionality after patching.

🔧 Temporary Workarounds

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns targeting the vulnerable endpoint.

Endpoint Restriction

all

Restrict access to /app/ax/checkBlindFields/ endpoint to authorized users only.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for idChallenge and idEmpresa parameters.
  • Deploy network segmentation to isolate the SportsNET application from sensitive databases.

🔍 How to Verify

Check if Vulnerable:

Test the endpoint with SQL injection payloads in idChallenge and idEmpresa parameters.

Check Version:

Check SportsNET version in application interface or configuration files.

Verify Fix Applied:

Retest with SQL injection payloads after implementing fixes to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts from single IP
  • Requests to checkBlindFields with suspicious parameters

Network Indicators:

  • Unusual database connection patterns
  • Large data transfers from application server

SIEM Query:

source="application.log" AND (url="*checkBlindFields*" AND (param="*idChallenge*" OR param="*idEmpresa*") AND (value="*' OR*" OR value="*;--*"))

🔗 References

📤 Share & Export