CVE-2025-40692

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Online Fire Reporting System v1.2 allows attackers to manipulate database queries through the 'requestid' parameter, potentially accessing, modifying, or deleting sensitive fire reporting data. Organizations using PHPGurukul's Online Fire Reporting System v1.2 are affected.

💻 Affected Systems

Products:
  • PHPGurukul Online Fire Reporting System
Versions: v1.2
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of v1.2 regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including theft of sensitive fire incident data, personal information, system credentials, and potential destruction of all reporting data.

🟠

Likely Case

Data exfiltration of fire reports, user information, and potential privilege escalation to administrative access.

🟢

If Mitigated

Limited data exposure if proper input validation and database permissions are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via GET parameter requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check vendor website for updates. 2. If no patch available, implement workarounds immediately. 3. Consider replacing with alternative software.

🔧 Temporary Workarounds

Input Validation Filter

all

Add parameter validation to only accept numeric values for requestid parameter

Modify details.php to add: if(!is_numeric($_GET['requestid'])) { die('Invalid request'); }

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement database-level permissions to limit damage from SQL injection

🔍 How to Verify

Check if Vulnerable:

Test /ofrs/details.php?requestid=1' OR '1'='1 and observe if SQL error or unexpected data returned

Check Version:

Check system documentation or admin panel for version information

Verify Fix Applied:

Test with malicious payloads after implementing fixes to ensure proper error handling

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed parameter validation attempts
  • Requests with SQL keywords in requestid parameter

Network Indicators:

  • HTTP requests containing SQL injection payloads to /ofrs/details.php
  • Unusual database query patterns from application server

SIEM Query:

source="web_logs" AND uri="/ofrs/details.php" AND (requestid="*'*" OR requestid="*OR*" OR requestid="*UNION*" OR requestid="*SELECT*")

🔗 References

📤 Share & Export