CVE-2024-55103
📋 TL;DR
Online Nurse Hiring System v1.0 contains a SQL injection vulnerability in the admin profile page that allows attackers to execute arbitrary SQL commands via the fullname parameter. This affects all deployments of version 1.0 of this PHP/MySQL application. Attackers could potentially access, modify, or delete sensitive database information.
💻 Affected Systems
- Online Nurse Hiring System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including credential theft, data exfiltration, and potential remote code execution via database functions.
Likely Case
Unauthorized access to sensitive nurse and patient data, administrative credential theft, and potential privilege escalation.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
Exploitation requires access to admin interface. SQL injection is straightforward with common tools like sqlmap.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
1. Locate /admin/profile.php
2. Replace vulnerable code with parameterized queries
3. Implement input validation for fullname parameter
4. Test thoroughly before deployment
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize fullname parameter
// In profile.php, add before SQL query:
$fullname = mysqli_real_escape_string($conn, $_POST['fullname']);
// Or use prepared statements
Web Application Firewall
allDeploy WAF with SQL injection rules
🧯 If You Can't Patch
- Restrict access to /admin/ directory to trusted IP addresses only
- Implement rate limiting and monitoring on admin endpoints
🔍 How to Verify
Check if Vulnerable:
Test /admin/profile.php with SQL injection payloads in fullname parameter: ' OR '1'='1
Check Version:
Check source code or documentation for version information
Verify Fix Applied:
Test with same payloads - should return error or sanitized output without SQL execution
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in logs
- Multiple failed login attempts to admin panel
- Suspicious fullname parameter values
Network Indicators:
- SQL injection patterns in HTTP POST requests
- Unusual database query patterns
SIEM Query:
source="web_logs" AND (uri="/admin/profile.php" AND (fullname CONTAINS "' OR" OR fullname CONTAINS "UNION" OR fullname CONTAINS "SELECT"))
🔗 References
- https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55103-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md
- https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/
- https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55103-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md