CVE-2024-3087

7.3 HIGH

📋 TL;DR

This is a critical SQL injection vulnerability in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Attackers can execute arbitrary SQL commands through the searchdata parameter in ambulance-tracking.php, potentially compromising the database. All installations of version 1.0 are affected.

💻 Affected Systems

Products:
  • PHPGurukul Emergency Ambulance Hiring Portal
Versions: 1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of version 1.0. The vulnerability is in the ambulance-tracking.php file component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution via database functions.

🟠

Likely Case

Database information disclosure, credential theft, and data manipulation affecting ambulance operations.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub. Remote exploitation requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider workarounds or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation and Parameterized Queries

all

Modify ambulance-tracking.php to implement proper input validation and use prepared statements for SQL queries.

Edit ambulance-tracking.php to replace raw SQL queries with parameterized queries using PDO or mysqli prepared statements.

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns in searchdata parameter.

Add WAF rule: Detect and block SQL injection patterns in POST/GET parameters containing 'searchdata'.

🧯 If You Can't Patch

  • Isolate the vulnerable system from internet access and restrict to internal network only.
  • Implement strict network segmentation and monitor all database access from the application server.

🔍 How to Verify

Check if Vulnerable:

Check if ambulance-tracking.php exists and contains unsanitized searchdata parameter usage in SQL queries.

Check Version:

Check application version in configuration files or about pages.

Verify Fix Applied:

Test the search functionality with SQL injection payloads to ensure they are properly blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following search requests
  • SQL syntax errors in application logs

Network Indicators:

  • HTTP requests to ambulance-tracking.php with SQL keywords in parameters
  • Unusual database connection patterns from application server

SIEM Query:

source="web_logs" AND uri="*ambulance-tracking.php*" AND (param="*searchdata*" AND value="*UNION* OR value="*SELECT*" OR value="*INSERT*" OR value="*DELETE*")

🔗 References

📤 Share & Export