CVE-2024-7189

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in itsourcecode Online Food Ordering System 1.0 allows attackers to upload arbitrary files via the 'photo' parameter in editproduct.php. This can lead to remote code execution or system compromise. Any organization using this software is affected.

💻 Affected Systems

Products:
  • itsourcecode Online Food Ordering System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the editproduct.php file specifically; requires web server with PHP support

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover via webshell upload leading to data theft, ransomware deployment, or use as attack platform

🟠

Likely Case

Webshell installation allowing persistent access, data exfiltration, or lateral movement

🟢

If Mitigated

File upload blocked, preventing exploitation but potentially disrupting legitimate photo upload functionality

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but attack surface reduced

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code publicly available on GitHub; simple file upload manipulation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider replacing with alternative software or implementing workarounds.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement strict file upload validation in editproduct.php

Add file type validation (allow only image extensions)
Add file size limits
Implement file content verification

Web Application Firewall Rules

all

Block malicious file upload attempts

WAF rule: Block requests with suspicious file extensions in upload parameters
WAF rule: Block requests with executable content in file uploads

🧯 If You Can't Patch

  • Remove or rename editproduct.php file if not needed
  • Implement network segmentation to isolate the vulnerable system

🔍 How to Verify

Check if Vulnerable:

Test if you can upload non-image files via the photo parameter in editproduct.php

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Attempt to upload malicious files; should be rejected with proper validation

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed upload attempts
  • Successful upload of non-image files
  • Access to uploaded files with suspicious extensions

Network Indicators:

  • HTTP POST requests to editproduct.php with file uploads
  • Traffic to unexpected file paths

SIEM Query:

source="web_server" AND uri="*editproduct.php*" AND method="POST" AND (file_extension="php" OR file_extension="exe" OR file_extension="sh")

🔗 References

📤 Share & Export