CVE-2024-30860

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands via the /admin/export_excel_user.php endpoint in netentsec NS-ASG 6.3, potentially leading to data theft, modification, or system compromise. It affects organizations using this specific version of the NS-ASG software, particularly those with internet-facing or internal administrative interfaces exposed.

💻 Affected Systems

Products:
  • netentsec NS-ASG
Versions: 6.3
Operating Systems: Not specified, likely various Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in a specific PHP file (/admin/export_excel_user.php) and may require administrative access or exposure of the admin interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise, including extraction of sensitive user data, administrative credentials, or execution of arbitrary commands leading to complete system takeover.

🟠

Likely Case

Unauthorized access to user data, such as usernames, passwords, or other personal information stored in the database, potentially enabling further attacks.

🟢

If Mitigated

Limited impact if the vulnerable endpoint is blocked or access is restricted, but residual risk remains if SQL injection is partially mitigated.

🌐 Internet-Facing: HIGH, as internet-facing instances allow remote attackers to exploit the vulnerability without internal network access.
🏢 Internal Only: MEDIUM, as internal attackers or compromised systems could exploit it, but requires some level of network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the admin endpoint; public proof-of-concept is available, making it easier for attackers to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not known

Restart Required: No

Instructions:

No official patch available; refer to workarounds or contact vendor for updates.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Restrict access to /admin/export_excel_user.php using web server configuration or firewall rules to prevent exploitation.

# Example for Apache: add to .htaccess
<Files "export_excel_user.php">
    Order Deny,Allow
    Deny from all
</Files>
# Example for Nginx: add to server block
location /admin/export_excel_user.php {
    deny all;
}

Input Validation and Sanitization

linux

Implement server-side input validation and use parameterized queries to sanitize user inputs in the PHP code.

# Example PHP code snippet using prepared statements
$stmt = $pdo->prepare('SELECT * FROM users WHERE id = :id');
$stmt->execute(['id' => $input]);

🧯 If You Can't Patch

  • Isolate the NS-ASG system in a segmented network to limit exposure and potential lateral movement.
  • Monitor logs and network traffic for unusual access patterns to the /admin/export_excel_user.php endpoint.

🔍 How to Verify

Check if Vulnerable:

Test the endpoint /admin/export_excel_user.php with SQL injection payloads (e.g., ' OR '1'='1) and check for error responses or unexpected data.

Check Version:

# Check version via web interface or system files; specific command not provided, but look for version info in admin panel or configuration files.

Verify Fix Applied:

After applying workarounds, attempt the same SQL injection tests to confirm the endpoint is blocked or inputs are sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries or errors in web server logs related to /admin/export_excel_user.php
  • Multiple failed login attempts or access to admin pages from unexpected IPs.

Network Indicators:

  • HTTP requests to /admin/export_excel_user.php with SQL-like parameters (e.g., containing 'UNION', 'SELECT', or quotes).

SIEM Query:

Example: source="web_logs" AND url="/admin/export_excel_user.php" AND (query CONTAINS "'" OR query CONTAINS "UNION")

🔗 References

📤 Share & Export