CVE-2024-7853

6.3 MEDIUM

📋 TL;DR

This CVE describes a critical SQL injection vulnerability in the Yoga Class Registration System that allows remote attackers to execute arbitrary SQL commands via the 'id' parameter in the /admin/?page=categories/view_category endpoint. Attackers can potentially read, modify, or delete database content. All users running vulnerable versions of this software are affected.

💻 Affected Systems

Products:
  • SourceCodester Yoga Class Registration System
Versions: Up to version 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin panel access path /admin/ to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, privilege escalation to admin access, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized data access, data manipulation, and potential authentication bypass leading to admin panel access.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to admin panel but SQL injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider replacing with alternative software or implementing custom fixes.

🔧 Temporary Workarounds

Input Validation Filter

all

Add parameter validation to sanitize 'id' parameter before SQL query execution.

Implement prepared statements or parameterized queries in the affected PHP file.

Web Application Firewall

all

Deploy WAF with SQL injection protection rules.

Configure WAF to block SQL injection patterns targeting the /admin/ endpoint.

🧯 If You Can't Patch

  • Restrict access to /admin/ endpoint using IP whitelisting or network segmentation.
  • Implement database user with minimal privileges (read-only if possible) for the application.

🔍 How to Verify

Check if Vulnerable:

Test the /admin/?page=categories/view_category endpoint with SQL injection payloads in the 'id' parameter.

Check Version:

Check system version in admin panel or configuration files.

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return error messages or are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts followed by SQL payloads

Network Indicators:

  • HTTP requests to /admin/?page=categories/view_category with SQL injection patterns in parameters

SIEM Query:

web.url:*admin* AND (web.param:*UNION* OR web.param:*SELECT* OR web.param:*OR*1=1*)

🔗 References

📤 Share & Export