CVE-2024-7911

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to perform file inclusion attacks on SourceCodester Simple Online Bidding System 1.0 by manipulating the 'page' parameter in /simple-online-bidding-system/bidding/index.php. This could lead to arbitrary code execution or sensitive file disclosure. Anyone running this specific version of the bidding system is affected.

💻 Affected Systems

Products:
  • SourceCodester Simple Online Bidding System
Versions: 1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PHP environment with file inclusion functions enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Arbitrary file reading leading to credential theft, configuration disclosure, or limited code execution.

🟢

If Mitigated

Attack blocked at web application firewall level with no impact.

🌐 Internet-Facing: HIGH - Attack can be initiated remotely without authentication.
🏢 Internal Only: MEDIUM - Still vulnerable but attack surface reduced to internal network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details publicly available on GitHub. Simple parameter manipulation required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider workarounds or replacing with alternative software.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add validation to ensure 'page' parameter only contains allowed values

Modify /simple-online-bidding-system/bidding/index.php to validate page parameter against whitelist

Web Application Firewall Rule

all

Block requests with suspicious file inclusion patterns in page parameter

Add WAF rule: deny if contains '../' or 'php://' in URL parameters

🧯 If You Can't Patch

  • Isolate the system behind a reverse proxy with strict input filtering
  • Implement network segmentation to limit lateral movement if compromised

🔍 How to Verify

Check if Vulnerable:

Test if accessing /simple-online-bidding-system/bidding/index.php?page=../../../../etc/passwd returns system files

Check Version:

Check application files for version indicators or readme files

Verify Fix Applied:

Verify that file inclusion attempts no longer work and return error pages

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests with '../' patterns in page parameter
  • Access to unexpected files via web server logs

Network Indicators:

  • HTTP requests with directory traversal sequences in parameters

SIEM Query:

web.url:*../* AND web.param:page

🔗 References

📤 Share & Export