CVE-2024-52675

9.8 CRITICAL

📋 TL;DR

CVE-2024-52675 is a critical SQL injection vulnerability in SourceCodester Sentiment Based Movie Rating System 1.0 that allows attackers to execute arbitrary SQL commands through the /msrps/movies.php endpoint. This affects all deployments of version 1.0 of this software, potentially exposing database contents including user credentials and sensitive data.

💻 Affected Systems

Products:
  • SourceCodester Sentiment Based Movie Rating System
Versions: 1.0
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of version 1.0 regardless of configuration. Requires PHP environment with database connectivity.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, privilege escalation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized access to sensitive movie rating data, user information extraction, and potential administrative account takeover.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection execution.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is typically exposed to internet users in web applications.
🏢 Internal Only: MEDIUM - Internal deployments still vulnerable but with reduced attack surface from external actors.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via GET parameters requires minimal technical skill. Public proof-of-concept demonstrates exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing custom fixes with parameterized queries.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting /msrps/movies.php endpoint

Input Validation Filter

all

Implement input sanitization for all parameters passed to movies.php

// PHP example: filter_input(INPUT_GET, 'parameter', FILTER_SANITIZE_STRING);

🧯 If You Can't Patch

  • Isolate the vulnerable system behind strict network segmentation
  • Implement database-level controls: minimal privileges, query logging, and regular credential rotation

🔍 How to Verify

Check if Vulnerable:

Test /msrps/movies.php endpoint with SQL injection payloads like ' OR '1'='1 in parameters

Check Version:

Check PHP files for version comments or review installation documentation

Verify Fix Applied:

Verify parameterized queries are implemented and SQL injection payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from web server
  • Multiple failed SQL syntax errors in application logs
  • Suspicious parameter values in access logs

Network Indicators:

  • HTTP requests to /msrps/movies.php with SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

web.url:"*/msrps/movies.php*" AND (http.param:*sql* OR http.param:*union* OR http.param:*select*)

🔗 References

📤 Share & Export