CVE-2024-41370

9.8 CRITICAL

📋 TL;DR

Organizr v1.90 contains a SQL injection vulnerability in the chat/setlike.php endpoint that allows attackers to execute arbitrary SQL commands. This affects all users running the vulnerable version, potentially compromising the entire application database. Attackers could steal, modify, or delete sensitive data stored in the Organizr database.

💻 Affected Systems

Products:
  • Organizr
Versions: v1.90 specifically
Operating Systems: All platforms running Organizr
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Organizr v1.90 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized data access and modification, including user credentials, configuration data, and chat history.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH - If Organizr is exposed to the internet, attackers can directly exploit this vulnerability without network access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized, and the public GitHub issue demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.91 or later

Vendor Advisory: https://github.com/causefx/Organizr/issues/1998

Restart Required: No

Instructions:

1. Backup your Organizr installation and database. 2. Update to v1.91 or later from the official GitHub repository. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable chat/setlike.php endpoint

all

Temporarily disable or block access to the vulnerable endpoint

# For Apache: RewriteRule ^chat/setlike\.php$ - [F,L]
# For Nginx: location ~ /chat/setlike\.php$ { deny all; }

Web Application Firewall (WAF) rules

all

Implement WAF rules to block SQL injection patterns targeting the vulnerable endpoint

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Deploy a web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running Organizr v1.90 by examining version files or checking the web interface

Check Version:

grep -r 'version' /path/to/organizr/install/ or check web interface

Verify Fix Applied:

Verify version is v1.91 or later and test the chat/setlike.php endpoint with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts from single IP
  • Requests to chat/setlike.php with SQL keywords

Network Indicators:

  • Unusual database connection patterns
  • Large data transfers from database server

SIEM Query:

source="organizr.log" AND ("chat/setlike.php" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "DROP"))

🔗 References

📤 Share & Export