CVE-2025-52410

9.8 CRITICAL

📋 TL;DR

Institute-of-Current-Students v1.0 contains a time-based blind SQL injection vulnerability in the mydetailsstudent.php endpoint. Attackers can exploit this to extract database contents, potentially compromising sensitive student information. Any system running this vulnerable version is affected.

💻 Affected Systems

Products:
  • Institute-of-Current-Students
Versions: v1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using the vulnerable mydetailsstudent.php endpoint with the myds parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of all student records, authentication credentials, and potential remote code execution through database functions.

🟠

Likely Case

Extraction of sensitive student data (names, contact info, grades) and potential privilege escalation within the application.

🟢

If Mitigated

Limited data exposure if database permissions are properly restricted and input validation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Time-based blind SQL injection requires specialized tools and knowledge but is well-documented in security literature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Review the GitHub issue for community fixes
2. Implement parameterized queries or prepared statements
3. Add input validation for the myds parameter
4. Update to a patched version if available

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block SQL injection patterns in the myds parameter

WAF-specific configuration required

Input Validation Filter

all

Add server-side validation to only accept expected values

Add validation in mydetailsstudent.php: if(!is_numeric($_GET['myds'])) { die('Invalid input'); }

🧯 If You Can't Patch

  • Disable or restrict access to the mydetailsstudent.php endpoint
  • Implement network segmentation to isolate the vulnerable system

🔍 How to Verify

Check if Vulnerable:

Test the mydetailsstudent.php endpoint with SQL injection payloads in the myds parameter and observe time delays

Check Version:

Check the application version in configuration files or about pages

Verify Fix Applied:

Test with SQL injection payloads and verify no database interaction occurs and proper error handling is in place

📡 Detection & Monitoring

Log Indicators:

  • Unusual long-running queries to mydetailsstudent.php
  • Multiple requests with SQL-like patterns in parameters

Network Indicators:

  • Repeated requests to mydetailsstudent.php with varying myds parameter values
  • Unusual timing patterns in HTTP responses

SIEM Query:

source="web_logs" AND uri="*mydetailsstudent.php*" AND (param="*myds=*SELECT*" OR param="*myds=*UNION*" OR param="*myds=*SLEEP*")

🔗 References

📤 Share & Export