CVE-2024-52675
📋 TL;DR
CVE-2024-52675 is a critical SQL injection vulnerability in SourceCodester Sentiment Based Movie Rating System 1.0 that allows attackers to execute arbitrary SQL commands through the /msrps/movies.php endpoint. This affects all deployments of version 1.0 of this software, potentially exposing database contents including user credentials and sensitive data.
💻 Affected Systems
- SourceCodester Sentiment Based Movie Rating System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, authentication bypass, privilege escalation, and potential remote code execution if database functions allow it.
Likely Case
Unauthorized access to sensitive movie rating data, user information extraction, and potential administrative account takeover.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection execution.
🎯 Exploit Status
SQL injection via GET parameters requires minimal technical skill. Public proof-of-concept demonstrates exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing custom fixes with parameterized queries.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns targeting /msrps/movies.php endpoint
Input Validation Filter
allImplement input sanitization for all parameters passed to movies.php
// PHP example: filter_input(INPUT_GET, 'parameter', FILTER_SANITIZE_STRING);
🧯 If You Can't Patch
- Isolate the vulnerable system behind strict network segmentation
- Implement database-level controls: minimal privileges, query logging, and regular credential rotation
🔍 How to Verify
Check if Vulnerable:
Test /msrps/movies.php endpoint with SQL injection payloads like ' OR '1'='1 in parameters
Check Version:
Check PHP files for version comments or review installation documentation
Verify Fix Applied:
Verify parameterized queries are implemented and SQL injection payloads no longer execute
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries from web server
- Multiple failed SQL syntax errors in application logs
- Suspicious parameter values in access logs
Network Indicators:
- HTTP requests to /msrps/movies.php with SQL keywords in parameters
- Unusual database connection patterns from web server
SIEM Query:
web.url:"*/msrps/movies.php*" AND (http.param:*sql* OR http.param:*union* OR http.param:*select*)