CVE-2024-41248

5.3 MEDIUM

📋 TL;DR

An unauthenticated attacker can add new subject entries to the Kashipara Responsive School Management System by exploiting incorrect access control in two PHP files. This affects all users of version 3.2.0 where these files are exposed. The vulnerability allows unauthorized modification of academic data without authentication.

💻 Affected Systems

Products:
  • Kashipara Responsive School Management System
Versions: v3.2.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations where /smsa/add_subject.php and /smsa/add_subject_submit.php are accessible via web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate academic records, add fraudulent subjects, disrupt curriculum planning, or use this as an entry point for further attacks if combined with other vulnerabilities.

🟠

Likely Case

Unauthorized addition of subjects leading to data integrity issues, administrative confusion, and potential academic record manipulation.

🟢

If Mitigated

Minimal impact with proper access controls, authentication requirements, and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to vulnerable endpoints with subject data. Public proof-of-concept available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check vendor website for security updates
2. Apply any available patches
3. Verify access controls are properly implemented

🔧 Temporary Workarounds

Restrict Access to Vulnerable Files

all

Block or restrict access to /smsa/add_subject.php and /smsa/add_subject_submit.php

# Apache: Add to .htaccess
<Files "add_subject.php">
    Order Deny,Allow
    Deny from all
</Files>
<Files "add_subject_submit.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /smsa/add_subject\.php$ {
    deny all;
}
location ~ /smsa/add_subject_submit\.php$ {
    deny all;
}

Implement Authentication Check

all

Add session validation to vulnerable PHP files

# Add to beginning of both PHP files
session_start();
if (!isset($_SESSION['user_id']) || $_SESSION['user_role'] !== 'admin') {
    header('HTTP/1.0 403 Forbidden');
    die('Access Denied');
}

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to vulnerable endpoints
  • Move system behind VPN or restrict to internal network only

🔍 How to Verify

Check if Vulnerable:

Send POST request to /smsa/add_subject_submit.php with subject data without authentication. If request succeeds, system is vulnerable.

Check Version:

Check system documentation or admin panel for version information

Verify Fix Applied:

Attempt same POST request after applying fixes. Should receive 403 Forbidden or redirect to login.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /smsa/add_subject_submit.php from unauthenticated users
  • Unusual subject additions in database logs

Network Indicators:

  • POST requests to vulnerable endpoints without authentication headers
  • Unusual traffic patterns to /smsa/ directory

SIEM Query:

source="web_server" AND (uri="/smsa/add_subject.php" OR uri="/smsa/add_subject_submit.php") AND http_method="POST" AND NOT user_authenticated="true"

🔗 References

📤 Share & Export