Skip to main content

CVE-2022-45010: n/a in n/a

Critical
VulnerabilityCVE-2022-45010cvecve-2022-45010n-acwe-89
Published: Wed Dec 07 2022 (12/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Simple Phone Book/Directory Web App v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter at /PhoneBook/edit.php.

AI-Powered Analysis

AILast updated: 06/21/2025, 18:22:31 UTC

Technical Analysis

CVE-2022-45010 is a critical SQL injection vulnerability identified in the Simple Phone Book/Directory Web App version 1.0. The vulnerability exists in the editid parameter of the /PhoneBook/edit.php endpoint. SQL injection (CWE-89) occurs when untrusted input is improperly sanitized and directly incorporated into an SQL query, allowing an attacker to manipulate the query structure. In this case, the editid parameter is vulnerable, enabling an attacker to inject malicious SQL code. Given the CVSS 3.1 base score of 9.8, this vulnerability is remotely exploitable over the network without requiring any authentication or user interaction (AV:N/AC:L/PR:N/UI:N). The impact includes full compromise of confidentiality, integrity, and availability of the backend database. An attacker could extract sensitive data, modify or delete records, or even execute administrative commands on the database server. The vulnerability affects a web application designed for managing phone book or directory entries, which may be used by organizations to store contact information. Although no specific vendor or product details beyond the app name and version are provided, the presence of this vulnerability in a publicly accessible web app poses a significant risk. No known exploits have been reported in the wild yet, and no patches or vendor advisories are currently available. However, the critical severity and ease of exploitation necessitate immediate attention to prevent potential exploitation.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for entities relying on the Simple Phone Book/Directory Web App or similar custom directory management solutions. Compromise of the database could lead to exposure of personal contact information, which may include employee, client, or partner data, potentially violating GDPR and other data protection regulations. The integrity of directory data could be undermined, causing operational disruptions and loss of trust. Availability impacts could disrupt internal communications and business processes relying on the directory service. Additionally, attackers could leverage this vulnerability as a foothold to pivot into internal networks, escalating privileges or deploying further malware. Organizations in sectors such as government, telecommunications, healthcare, and enterprises with large contact databases are particularly at risk. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and automatically, increasing the likelihood of attacks if the app is internet-facing.

Mitigation Recommendations

1. Immediate code review and remediation: Sanitize and validate all user inputs, especially the editid parameter, using parameterized queries or prepared statements to prevent SQL injection. 2. Implement Web Application Firewalls (WAFs) with SQL injection detection rules to provide a temporary protective layer until the vulnerability is patched. 3. Restrict access to the affected web application to trusted internal networks or VPNs where possible, reducing exposure to the internet. 4. Conduct thorough security testing (e.g., dynamic application security testing - DAST) on the web app to identify and remediate similar injection flaws. 5. Monitor logs for suspicious SQL query patterns or unusual access to the /PhoneBook/edit.php endpoint. 6. Establish an incident response plan to quickly address any signs of exploitation. 7. If possible, migrate to a more secure and actively maintained directory management solution. 8. Educate developers on secure coding practices to prevent injection vulnerabilities in future development.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-07T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf5a55

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 6:22:31 PM

Last updated: 8/1/2025, 12:08:59 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats