CVE-2024-48325

8.1 HIGH

📋 TL;DR

CVE-2024-48325 is an unauthenticated SQL injection vulnerability in Portabilis i-Educar 2.8.0 that allows remote attackers to execute arbitrary SQL commands. This affects all systems running the vulnerable version of the educational management software. Attackers can potentially access, modify, or delete database content without authentication.

💻 Affected Systems

Products:
  • Portabilis i-Educar
Versions: 2.8.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive student/teacher data exfiltration, credential theft, and potential remote code execution through database functions.

🟠

Likely Case

Data extraction from the i-Educar database including personally identifiable information, academic records, and system configuration data.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and database permissions restrict unauthorized access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains proof-of-concept exploit code demonstrating the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add proper input validation and parameterized queries to the getDocuments function in InstituicaoDocumentacaoController

Modify the PHP code to use prepared statements with PDO or mysqli

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting the vulnerable endpoint

Add WAF rule: Block requests containing SQL keywords to /module/Api/InstituicaoDocumentacao

🧯 If You Can't Patch

  • Restrict network access to the i-Educar application using firewall rules to only allow trusted IP addresses
  • Implement rate limiting and monitoring on the vulnerable endpoint to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Test the endpoint with SQL injection payloads: /module/Api/InstituicaoDocumentacao?oper=get&resource=getDocuments&instituicao_id=1' OR '1'='1

Check Version:

Check the i-Educar version in the application interface or configuration files

Verify Fix Applied:

Test the same endpoint with SQL injection payloads and verify they are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple requests to the vulnerable endpoint with SQL keywords

Network Indicators:

  • HTTP requests to /module/Api/InstituicaoDocumentacao containing SQL injection patterns

SIEM Query:

source="web_logs" AND uri="/module/Api/InstituicaoDocumentacao" AND (query="*OR*" OR query="*UNION*" OR query="*SELECT*" OR query="*--*" OR query="*'*")

🔗 References

📤 Share & Export