CVE-2024-7842

5.3 MEDIUM

📋 TL;DR

This vulnerability in SourceCodester Online Graduate Tracer System 1.0 allows remote attackers to access sensitive information through the /tracking/admin/export_it.php file. It affects all deployments of this specific software version where the vulnerable component is accessible. The information disclosure could expose system data or user information.

💻 Affected Systems

Products:
  • SourceCodester Online Graduate Tracer System
Versions: 1.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of version 1.0 with the vulnerable file accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive database information, user credentials, or system configuration details, potentially leading to further compromise of the system or data breaches.

🟠

Likely Case

Unauthorized access to system information or user data that could be used for reconnaissance or targeted attacks.

🟢

If Mitigated

Limited exposure of non-critical system information with minimal operational impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Restrict access to vulnerable file

all

Block or restrict access to /tracking/admin/export_it.php using web server configuration or firewall rules.

# Apache: Add to .htaccess
<Files "export_it.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /tracking/admin/export_it\.php$ {
    deny all;
    return 403;
}

Remove vulnerable file

linux

Delete or rename the vulnerable export_it.php file if not required for functionality.

rm /path/to/tracking/admin/export_it.php
mv /path/to/tracking/admin/export_it.php /path/to/tracking/admin/export_it.php.disabled

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the vulnerable endpoint.
  • Monitor access logs for suspicious requests to /tracking/admin/export_it.php.

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[target]/tracking/admin/export_it.php and check if it returns sensitive information without authentication.

Check Version:

Check the software version in the application interface or configuration files.

Verify Fix Applied:

Verify that accessing the vulnerable endpoint returns an error or is blocked after implementing workarounds.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /tracking/admin/export_it.php
  • Unusual file access patterns to the vulnerable endpoint

Network Indicators:

  • HTTP GET requests to the vulnerable path from untrusted sources

SIEM Query:

source="web_server_logs" AND uri_path="/tracking/admin/export_it.php"

🔗 References

📤 Share & Export