CVE-2024-33960

9.8 CRITICAL

📋 TL;DR

This is a critical SQL injection vulnerability in a payment processing component that allows attackers to execute arbitrary SQL queries. Attackers can retrieve all data from the database by exploiting the 'end' parameter in the printreport.php file. Organizations using affected versions of the payment software are at risk.

💻 Affected Systems

Products:
  • Janobe Products (PayPal, Credit Card and Debit Card Payment module)
Versions: 1.0
Operating Systems: All platforms running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the admin interface's reporting functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive payment data (credit card numbers, personal information), authentication credentials, and potential lateral movement to other systems.

🟠

Likely Case

Data exfiltration of payment records, customer information, and administrative credentials leading to financial fraud and data breach.

🟢

If Mitigated

Limited or no data exposure if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the admin interface but SQL injection vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products

Restart Required: No

Instructions:

1. Check vendor website for updates 2. Apply any available patches 3. Test functionality after patching

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for all user inputs

Access Control Restriction

all

Restrict access to /admin/mod_reports/printreport.php to authorized users only

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection rules
  • Disable or remove the vulnerable component if not essential

🔍 How to Verify

Check if Vulnerable:

Check if version 1.0 of the payment module is installed and accessible at /admin/mod_reports/printreport.php

Check Version:

Check software documentation or configuration files for version information

Verify Fix Applied:

Test the vulnerable endpoint with SQL injection payloads to confirm they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts to admin interface
  • Large data export requests

Network Indicators:

  • SQL injection patterns in HTTP requests to printreport.php
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND uri="/admin/mod_reports/printreport.php" AND (query="*UNION*" OR query="*SELECT*" OR query="*INSERT*")

🔗 References

📤 Share & Export