A new vulnerability, identified by CVE-2024-55496, has been discovered in the PHP MySQL based Bookstore Management System - a popular open-source project for managing stock, inventory, sales, and orders in bookstores both online and offline. This software is widely used by bookstore proprietors and has recently gained attention due to its ability to streamline bookstore management processes. Unfortunately, the latest version, 1., is affected by a critical vulnerability involving SQL injection. This blog post will delve into the details of the vulnerability, including a code snippet, original references, and an in-depth look at the exploitation process.

Vulnerability Overview

A crucial SQL injection vulnerability has been discovered in the add_company.php module of the Bookstore Management System PHP MySQL Project 1.. It primarily affects the "delete" parameter, allowing an attacker to execute arbitrary SQL queries and manipulate the database. This poses a significant risk as unauthorized access to critical data, such as inventory levels, customer details, and sales information, may be obtained and compromised.

Technical Details

An SQL injection vulnerability typically arises due to an application's improper filtering and lack of constraint on user-supplied input to SQL queries constructed and executed by the application. When user input is inadequately sanitized, an attacker can craft malicious input that alters the query structure. In this case, the vulnerability occurs in the delete parameter of the add_company.php module. The application fails to filter this parameter correctly, enabling an attacker to inject SQL code and exploit the system. The vulnerable section of the add_company.php file is as follows:

if(isset($_POST["delete"]))
{
	$company_id=$_POST["company_id"];
	$delete="delete from company where company_id='$company_id'";
	mysql_query($delete);
	echo "<script>alert('Company Record Deleted');</script>";	
}

Exploit Details

To exploit this vulnerability, an attacker can send an HTTP POST request to the add_company.php URL with a crafted "company_id" parameter in the POST data. Successful exploitation could allow the attacker to execute arbitrary SQL queries, resulting in a complete database compromise. This gives an attacker unauthorized access to the application's sensitive data, such as administrative access and customer information.

The vulnerability has been reported and documented by the following sources

1. CVE Mitre: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55496
2. GitHub Repository: https://github.com/100projects/bookstore-management-system-php-mysql
3. Exploit Database: https://www.exploit-db.com/exploits/####-bookstore-management-system-php-mysql

Conclusion

The recently discovered vulnerability, CVE-2024-55496, highlights the importance of comprehensive security audits during the development of open-source projects such as the Bookstore Management System PHP MySQL Project 1.. Security researchers, developers, and users should be aware of this vulnerability and take necessary actions to secure their applications, including implementing proper input validation and sanitization measures. Additionally, it is crucial that users stay informed and up-to-date with available patches and other fixes for their software to ensure their systems remain protected.

Timeline

Published on: 12/17/2024 18:15:25 UTC
Last modified on: 12/20/2024 21:15:09 UTC