CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-34987

Medium Severity
SVRS
34/100

CVSSv3
NA/10

EPSS
0.00063/1

CVE-2024-34987: SQL Injection in PHPGurukul Online Fire Reporting System 1.2 allows unauthorized access. Attackers can bypass authentication by injecting SQL commands into the username field. This SQL Injection vulnerability in ofrs/admin/index.php poses a significant security risk. While the CVSS score is 0, the "In The Wild" tag indicates active exploitation. The SOCRadar Vulnerability Risk Score (SVRS) is 34, suggesting a moderate risk, but monitoring is still recommended. Successful exploitation leads to complete system takeover, making prompt patching crucial to mitigate the potential for data breaches and system compromise. Organizations using this system should immediately apply available patches or implement workarounds to prevent exploitation and safeguard sensitive data.

In The Wild
2024-06-03

2024-08-14
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-34987 is a SQL Injection vulnerability in PHPGurukul Online Fire Reporting System 1.2 that allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process. The SVRS of 34 indicates a moderate risk, requiring attention and appropriate mitigation measures.

Key Insights:

  • Authentication Bypass: This vulnerability allows attackers to bypass authentication mechanisms, potentially leading to unauthorized access to sensitive data or system resources.
  • SQL Injection: The vulnerability exploits the lack of proper input validation, enabling attackers to execute arbitrary SQL queries on the database.
  • Remote Exploitation: The vulnerability can be exploited remotely, allowing attackers to target the system from anywhere with internet access.

Mitigation Strategies:

  • Input Validation: Implement robust input validation mechanisms to prevent the injection of malicious SQL commands.
  • Use Prepared Statements: Utilize prepared statements to prevent SQL injection by parameterizing queries and preventing the execution of arbitrary SQL commands.
  • Limit User Privileges: Restrict user privileges to the minimum necessary to perform their tasks, reducing the impact of potential exploitation.
  • Regular Security Updates: Regularly apply security updates and patches to address vulnerabilities as they are discovered.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: No active exploits have been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: There is no evidence that this vulnerability is actively exploited by hackers.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-34987 | PHPGurukul Online Fire Reporting System 1.2 ofrs/admin/index.php username sql injection
vuldb.com2024-06-03
CVE-2024-34987 | PHPGurukul Online Fire Reporting System 1.2 ofrs/admin/index.php username sql injection | A vulnerability, which was classified as critical, has been found in PHPGurukul Online Fire Reporting System 1.2. Affected by this issue is some unknown functionality of the file ofrs/admin/index.php. The manipulation of the argument username leads to sql injection. This vulnerability is handled as CVE-2024-34987<
vuldb.com
rss
forum
news

Social Media

🚨 CVE-2024-34987: Critical SQL injection in PHPGurukul Online Fire Reporting System 1.2. Remote exploit available. Patch immediately and verify no unauthorized access. Audit SQL security practices. #SQLi #InfoSec
0
0
0
CVE-2024-34987 A SQL Injection vulnerability exists in the `ofrs/admin/index.php` script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass… https://t.co/i6fJpGzqr5
0
1
2

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md
[email protected]https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md
[email protected]https://www.exploit-db.com/exploits/51989
GITHUBhttps://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md
GITHUBhttps://www.exploit-db.com/exploits/51989

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence