CVE-2024-48222

7.2 HIGH

📋 TL;DR

Funadmin v5.0.2 contains a SQL injection vulnerability in the /curd/table/edit endpoint that allows attackers to execute arbitrary SQL commands. This affects all systems running the vulnerable version of Funadmin, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • Funadmin
Versions: v5.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; other versions may also be vulnerable but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, deletion, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, privilege escalation, and data manipulation affecting application functionality.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the vulnerable endpoint, which may require authentication depending on configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v5.0.3 or later

Vendor Advisory: https://github.com/funadmin/funadmin/issues/22

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from the official repository. 3. Replace vulnerable files with patched versions. 4. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for the /curd/table/edit endpoint parameters.

Modify application code to sanitize all user inputs before processing SQL queries.

WAF Rule

all

Deploy web application firewall rules to block SQL injection patterns.

Configure WAF to detect and block SQL injection attempts targeting /curd/table/edit.

🧯 If You Can't Patch

  • Restrict network access to the Funadmin application to trusted IPs only.
  • Implement database user privilege restrictions to minimize potential damage.

🔍 How to Verify

Check if Vulnerable:

Check if running Funadmin v5.0.2 and test the /curd/table/edit endpoint with SQL injection payloads.

Check Version:

Check the version in the application's configuration files or admin panel.

Verify Fix Applied:

Verify version is updated to v5.0.3+ and test that SQL injection attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts followed by SQL errors
  • Requests to /curd/table/edit with suspicious parameters

Network Indicators:

  • SQL error messages in HTTP responses
  • Unusual database connection patterns from application server

SIEM Query:

source="web_logs" AND uri="/curd/table/edit" AND (payload="' OR " OR payload="UNION" OR payload="SELECT" OR payload="INSERT" OR payload="UPDATE" OR payload="DELETE")

🔗 References

📤 Share & Export