CVE-2024-37699

9.8 CRITICAL

📋 TL;DR

CVE-2024-37699 is a critical SQL injection vulnerability in DataLife Engine's dboption component that allows attackers to execute arbitrary SQL commands. This affects DataLife Engine v17.1 and earlier versions, potentially compromising CMS installations and underlying databases. Attackers can exploit this to steal sensitive data, modify database contents, or gain unauthorized access.

💻 Affected Systems

Products:
  • DataLife Engine
Versions: v17.1 and earlier
Operating Systems: All platforms running DataLife Engine
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using vulnerable versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, privilege escalation, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized data extraction including user credentials, sensitive content, and configuration data, potentially leading to site defacement or account takeover.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, though SQL injection attempts may still be logged.

🌐 Internet-Facing: HIGH - Web applications are directly exposed to internet-based attacks targeting the vulnerable dboption component.
🏢 Internal Only: MEDIUM - Internal systems could be exploited by authenticated users or through lateral movement, but exposure is more limited.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit references exist, and SQL injection vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v17.2

Vendor Advisory: https://dle-news.ru/pressrelease/1909-datalife-engine-v172-press-release.html

Restart Required: No

Instructions:

1. Download DataLife Engine v17.2 from official sources. 2. Backup current installation and database. 3. Replace all files with v17.2 files. 4. Run upgrade script if provided. 5. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for dboption parameters to filter SQL injection attempts

Modify dboption handling code to sanitize all user inputs using parameterized queries or prepared statements

Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns targeting dboption endpoints

Configure WAF with SQL injection detection rules for DataLife Engine paths

🧯 If You Can't Patch

  • Implement network segmentation to isolate DataLife Engine from critical databases
  • Enable detailed logging and monitoring for SQL injection attempts on dboption endpoints

🔍 How to Verify

Check if Vulnerable:

Check DataLife Engine version in admin panel or by examining version files. Versions 17.1 and earlier are vulnerable.

Check Version:

Check admin panel or examine includes/version.php file for version information

Verify Fix Applied:

Verify installation shows version 17.2 or later in admin panel and test dboption functionality with safe inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following dboption access
  • Suspicious parameter values in web server logs for dboption endpoints

Network Indicators:

  • SQL injection patterns in HTTP requests to dboption paths
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (uri="*dboption*" AND (param="*' OR *" OR param="*;--*" OR param="*UNION*"))

🔗 References

📤 Share & Export