CVE-2024-33273

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in shipup versions before 3.3.0 allows remote attackers to execute arbitrary SQL commands via the getShopID function. Attackers can escalate privileges, potentially gaining administrative access to affected systems. Organizations using shipup for shipping management are affected.

💻 Affected Systems

Products:
  • shipup
Versions: All versions before 3.3.0
Operating Systems: All platforms running shipup
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations using vulnerable versions regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative access, data exfiltration, and potential lateral movement to connected systems.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access within the shipup application.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting SQL execution.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication.
🏢 Internal Only: HIGH - Internal attackers can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity when details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.0

Vendor Advisory: https://www.shipup.co/fr

Restart Required: Yes

Instructions:

1. Backup your current shipup installation and database. 2. Download shipup version 3.3.0 or later from the official website. 3. Replace the existing installation with the updated version. 4. Restart the shipup service or web server.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for the getShopID parameter to reject SQL injection attempts.

# Add parameter validation in application code
# Example: if not re.match('^[a-zA-Z0-9_-]+$', shop_id): reject

Web Application Firewall Rules

all

Configure WAF to block SQL injection patterns targeting the vulnerable endpoint.

# Add WAF rule to block SQL patterns in getShopID parameter
# Example ModSecurity rule: SecRule ARGS:shop_id "@detectSQLi" "id:1001,phase:2,deny"

🧯 If You Can't Patch

  • Implement network segmentation to isolate shipup systems from critical infrastructure.
  • Enable detailed logging and monitoring for SQL injection attempts on the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check shipup version in admin panel or configuration files. If version is below 3.3.0, system is vulnerable.

Check Version:

# Check version in shipup admin interface or configuration files

Verify Fix Applied:

Confirm shipup version is 3.3.0 or higher and test the getShopID function with SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by successful admin access
  • GET/POST requests containing SQL keywords in shop_id parameter

Network Indicators:

  • HTTP requests with SQL injection patterns in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (url="*getShopID*" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*DELETE*"))

🔗 References

📤 Share & Export