CVE-2024-9429

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in Restaurant Reservation System 1.0 allows attackers to execute arbitrary SQL commands through the /filter2.php endpoint. Remote attackers can potentially access, modify, or delete database content. All users of Restaurant Reservation System 1.0 are affected.

💻 Affected Systems

Products:
  • Restaurant Reservation System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /filter2.php file with 'from' and 'to' parameters

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, and potential remote code execution via database functions

🟠

Likely Case

Database information disclosure, data manipulation, and potential authentication bypass

🟢

If Mitigated

Limited impact with proper input validation and database permissions

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit disclosed on GitHub, SQL injection requires minimal technical skill

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add parameter validation and sanitization for 'from' and 'to' parameters in filter2.php

Modify filter2.php to validate and sanitize user inputs before database queries

Web Application Firewall Rules

all

Block SQL injection patterns targeting filter2.php parameters

Add WAF rules to detect and block SQL injection attempts on /filter2.php

🧯 If You Can't Patch

  • Disable or restrict access to /filter2.php endpoint
  • Implement strict network segmentation and limit database permissions

🔍 How to Verify

Check if Vulnerable:

Test /filter2.php with SQL injection payloads in 'from' or 'to' parameters

Check Version:

Check system documentation or source code for version information

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and return proper error handling

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed parameter validation attempts on filter2.php

Network Indicators:

  • HTTP requests to /filter2.php with SQL keywords in parameters

SIEM Query:

source="web_logs" AND uri="/filter2.php" AND (param="from" OR param="to") AND (query="SELECT" OR query="UNION" OR query="OR 1=1")

🔗 References

📤 Share & Export