CVE-2024-51102

4.4 MEDIUM

📋 TL;DR

This CVE describes SQL injection vulnerabilities in PHPGURUKUL Student Management System v1's login page. Attackers can inject malicious SQL code through username and password fields, potentially bypassing authentication or extracting database information. Organizations using this specific software version are affected.

💻 Affected Systems

Products:
  • PHPGURUKUL Student Management System
Versions: v1.0
Operating Systems: Any OS running PHP and MySQL
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the login.php page specifically; requires PHP and MySQL backend

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, or system takeover

🟠

Likely Case

Authentication bypass allowing unauthorized access to student management system

🟢

If Mitigated

Failed login attempts logged with no data compromise if input validation is implemented

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub repository; exploitation requires no authentication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

1. Review the provided GitHub writeup for vulnerability details
2. Manually implement parameterized queries or input validation
3. Replace raw SQL queries with prepared statements in login.php

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block malicious payloads

Input Validation

all

Implement server-side input validation for username and password fields

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement network segmentation to limit database access

🔍 How to Verify

Check if Vulnerable:

Test login.php with SQL injection payloads like ' OR '1'='1 in username/password fields

Check Version:

Check software version in system documentation or configuration files

Verify Fix Applied:

Attempt SQL injection after implementing parameterized queries; successful attacks should fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in login attempts
  • Multiple failed logins with special characters

Network Indicators:

  • HTTP POST requests to login.php containing SQL keywords

SIEM Query:

source="web_logs" AND uri="/login.php" AND (request CONTAINS "OR" OR request CONTAINS "UNION" OR request CONTAINS "SELECT")

🔗 References

📤 Share & Export