CVE-2024-6191

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in itsourcecode Student Management System 1.0 allows attackers to execute arbitrary SQL commands through the login.php user parameter. Remote attackers can potentially access, modify, or delete database contents. All deployments of version 1.0 with default configurations are affected.

💻 Affected Systems

Products:
  • itsourcecode Student Management System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the login.php component specifically. Any deployment with this version is vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, authentication bypass, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized access to student records, grade manipulation, credential theft, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation preventing database access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. SQL injection on login page typically requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider migrating to supported software or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add server-side validation to sanitize user input in login.php

Modify login.php to use prepared statements with parameterized queries

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns

Configure WAF to block SQL injection patterns in login requests

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement network segmentation to limit database access from application servers

🔍 How to Verify

Check if Vulnerable:

Test login.php with SQL injection payloads like ' OR '1'='1 in user parameter

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and login.php uses parameterized queries

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts with SQL patterns
  • Database connection errors

Network Indicators:

  • HTTP requests to login.php containing SQL keywords
  • Unusual database traffic patterns

SIEM Query:

source="web_logs" AND uri="/login.php" AND (user="*OR*" OR user="*UNION*" OR user="*SELECT*")

🔗 References

📤 Share & Export