CVE-2024-45918

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Fujian Kelixin Communication Command and Dispatch Platform allows attackers to execute arbitrary SQL commands via the /client/get_gis_fence.php endpoint. Systems running version 7.6.6.4391 or earlier are affected, potentially exposing sensitive data and system control.

💻 Affected Systems

Products:
  • Fujian Kelixin Communication Command and Dispatch Platform
Versions: <= 7.6.6.4391
Operating Systems: Any OS running the platform
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable version are affected regardless of configuration

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, and full system takeover

🟠

Likely Case

Database information disclosure including user credentials, sensitive operational data, and potential lateral movement

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface and requires no authentication
🏢 Internal Only: HIGH - Even internal systems are vulnerable to insider threats or compromised internal accounts

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub gist, exploitation requires minimal technical skill

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.kirisun.com/

Restart Required: No

Instructions:

Check vendor website for security updates. If patch unavailable, implement workarounds immediately.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Block SQL injection patterns targeting /client/get_gis_fence.php endpoint

WAF-specific rules to block SQL injection patterns

Endpoint Restriction

linux

Restrict access to vulnerable endpoint using network controls

iptables -A INPUT -p tcp --dport 80 -m string --string "/client/get_gis_fence.php" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in application code
  • Apply principle of least privilege to database accounts and restrict network access to database server

🔍 How to Verify

Check if Vulnerable:

Test /client/get_gis_fence.php endpoint with SQL injection payloads or check version against affected range

Check Version:

Check platform version in admin interface or configuration files

Verify Fix Applied:

Test endpoint with SQL injection payloads to confirm they're blocked or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following SQL injection patterns
  • Access to /client/get_gis_fence.php with suspicious parameters

Network Indicators:

  • HTTP requests to /client/get_gis_fence.php containing SQL keywords (SELECT, UNION, etc.)
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/client/get_gis_fence.php" AND (query CONTAINS "UNION" OR query CONTAINS "SELECT" OR query CONTAINS "--")

🔗 References

📤 Share & Export