CVE-2024-50724

9.8 CRITICAL

📋 TL;DR

KASO v9.0 contains a SQL injection vulnerability in the person_id parameter at /cardcase/editcard.jsp that allows attackers to execute arbitrary SQL commands. This affects all systems running KASO v9.0 with the vulnerable endpoint accessible. Attackers could potentially read, modify, or delete database contents.

💻 Affected Systems

Products:
  • KASO
Versions: v9.0
Operating Systems: All operating systems running KASO
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of KASO v9.0 with the /cardcase/editcard.jsp endpoint accessible are vulnerable. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized data access and extraction of sensitive information from the KASO database, potentially including user credentials and business data.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection, though the vulnerability still exists in the code.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface, making internet-facing instances immediately vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via URL parameter is trivial to exploit with standard SQL injection techniques. Public GitHub repository demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check vendor website for security updates
2. Apply any available patches for KASO v9.0
3. Verify the fix by testing the vulnerable endpoint

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the person_id parameter

Input Validation Filter

all

Implement server-side validation to restrict person_id to expected numeric values only

🧯 If You Can't Patch

  • Block access to /cardcase/editcard.jsp endpoint at network or application firewall level
  • Implement parameterized queries or prepared statements in the application code

🔍 How to Verify

Check if Vulnerable:

Test the endpoint with SQL injection payloads: /cardcase/editcard.jsp?person_id=1' OR '1'='1

Check Version:

Check KASO version in application interface or configuration files

Verify Fix Applied:

Test with same SQL injection payloads and verify they are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple requests to /cardcase/editcard.jsp with SQL keywords in parameters
  • Database error messages containing SQL syntax

Network Indicators:

  • HTTP requests to /cardcase/editcard.jsp containing SQL injection patterns like UNION, SELECT, OR 1=1

SIEM Query:

source="web_logs" AND uri="/cardcase/editcard.jsp" AND (query="*UNION*" OR query="*SELECT*" OR query="*OR 1=1*")

🔗 References

📤 Share & Export