CVE-2024-41372

9.8 CRITICAL

📋 TL;DR

Organizr v1.90 contains a SQL injection vulnerability in chat/settyping.php that allows attackers to execute arbitrary SQL commands. This affects all users running the vulnerable version, potentially leading to data theft, modification, or deletion. The vulnerability is particularly dangerous due to its high CVSS score of 9.8.

💻 Affected Systems

Products:
  • Organizr
Versions: v1.90
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the vulnerable chat/settyping.php endpoint accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the database including data exfiltration, privilege escalation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized access to sensitive user data, modification of application data, and potential authentication bypass.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only affecting non-sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with basic knowledge of SQL and web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.91 or later

Vendor Advisory: https://github.com/causefx/Organizr/issues/1999

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from GitHub. 3. Replace the vulnerable files. 4. Verify the chat/settyping.php file has been updated.

🔧 Temporary Workarounds

Disable chat endpoint

linux

Temporarily disable or restrict access to the vulnerable chat/settyping.php endpoint

mv chat/settyping.php chat/settyping.php.disabled

Web server restriction

all

Block access to the vulnerable endpoint via web server configuration

Location /chat/settyping.php\n    Deny from all\n/Location

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all SQL statements
  • Apply network segmentation and restrict database access to only necessary services

🔍 How to Verify

Check if Vulnerable:

Check if running Organizr v1.90 and if chat/settyping.php exists and is accessible

Check Version:

Check the version.txt file or Organizr web interface

Verify Fix Applied:

Verify version is v1.91 or later and test the chat/settyping.php endpoint with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts via chat endpoint
  • SQL syntax errors in application logs

Network Indicators:

  • Unusual POST requests to /chat/settyping.php with SQL keywords
  • Excessive database connections from web server

SIEM Query:

source="web_logs" AND uri="/chat/settyping.php" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "INSERT")

🔗 References

📤 Share & Export