CVE-2024-35409

9.8 CRITICAL

📋 TL;DR

CVE-2024-35409 is a critical SQL injection vulnerability in WeBid 1.1.2 that allows attackers to execute arbitrary SQL commands via the admin/tax.php endpoint. This affects all WeBid 1.1.2 installations with the vulnerable file present. Attackers could potentially access, modify, or delete database contents.

💻 Affected Systems

Products:
  • WeBid
Versions: 1.1.2
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the admin/tax.php file to be present and accessible. Default installations include this file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, privilege escalation, and potential administrative account takeover.

🟢

If Mitigated

Limited impact if proper input validation, parameterized queries, and web application firewalls are in place.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface, making internet-facing installations immediately vulnerable.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the admin interface. The vulnerability is in a specific PHP file with demonstrated SQL injection vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Download the vulnerable file (admin/tax.php) 2. Implement parameterized queries or proper input validation 3. Replace the vulnerable file with the patched version 4. Test functionality

🔧 Temporary Workarounds

File Access Restriction

all

Restrict access to the vulnerable admin/tax.php file using web server configuration

# Apache: Add to .htaccess
<Files "tax.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /admin/tax\.php$ {
    deny all;
    return 403;
}

Web Application Firewall

all

Implement WAF rules to block SQL injection patterns targeting the tax.php endpoint

# ModSecurity example rule
SecRule REQUEST_URI "@contains admin/tax.php" \
    "id:1001,phase:2,deny,status:403,msg:'SQLi attempt blocked'" \
    "chain"
SecRule ARGS "@detectSQLi"

🧯 If You Can't Patch

  • Implement network segmentation to isolate the WeBid server from sensitive systems
  • Enable detailed logging and monitoring for suspicious database queries and admin panel access

🔍 How to Verify

Check if Vulnerable:

Check if admin/tax.php exists in your WeBid installation and review the code for lack of parameterized queries in SQL statements.

Check Version:

Check the version.txt file in WeBid root directory or examine the installation files for version indicators.

Verify Fix Applied:

Test the admin/tax.php functionality with SQL injection payloads to ensure they are properly sanitized or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts to admin panel followed by tax.php access
  • SQL syntax errors in web server logs for tax.php

Network Indicators:

  • HTTP POST requests to /admin/tax.php containing SQL keywords (UNION, SELECT, INSERT, etc.)
  • Unusual database connection patterns from web server

SIEM Query:

source="web_server" AND uri="/admin/tax.php" AND (request_body="*UNION*" OR request_body="*SELECT*" OR request_body="*INSERT*")

🔗 References

📤 Share & Export