Skip to main content

CVE-2023-6898: CWE-89 SQL Injection in SourceCodester Best Courier Management System

Medium
VulnerabilityCVE-2023-6898cvecve-2023-6898cwe-89
Published: Sun Dec 17 2023 (12/17/2023, 10:31:04 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Best Courier Management System

Description

A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248256.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:43:10 UTC

Technical Analysis

CVE-2023-6898 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Best Courier Management System, specifically within an unspecified function in the manage_user.php file. The vulnerability arises from improper sanitization or validation of the 'id' parameter, allowing an attacker to inject malicious SQL code. This injection can manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of database operations. The vulnerability is classified under CWE-89, which pertains to SQL Injection flaws. The CVSS v3.1 base score is 5.5 (medium severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality, integrity, and availability rated as low (C:L/I:L/A:L). Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The absence of available patches or updates at the time of disclosure means affected organizations must rely on other mitigation strategies until a fix is released.

Potential Impact

For European organizations using the SourceCodester Best Courier Management System version 1.0, this vulnerability poses a tangible risk to the confidentiality, integrity, and availability of their courier management data. Exploitation could allow attackers to access sensitive user information, manipulate user accounts, or disrupt courier operations, potentially leading to service outages or data breaches. Given the critical nature of courier services in logistics and supply chains, such disruptions could have cascading effects on business operations and customer trust. The medium CVSS score reflects that while exploitation requires some level of privilege and network adjacency, no user interaction is needed, making insider threats or attackers within the same network segment particularly concerning. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as public disclosure may facilitate development of exploit code. European organizations handling personal data under GDPR must also consider regulatory implications if a breach occurs due to this vulnerability.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the management interface, ensuring it is not exposed to untrusted networks or the internet. 2. Implement strict input validation and parameterized queries or prepared statements in the manage_user.php file to prevent SQL injection. Since no official patch is available, organizations with development capabilities should audit and remediate the vulnerable code themselves. 3. Employ Web Application Firewalls (WAFs) with SQL injection detection and prevention rules tailored to the application’s traffic patterns. 4. Monitor logs for suspicious activities targeting the 'id' parameter or unusual database query patterns. 5. Limit privileges of accounts interacting with the database to the minimum necessary to reduce impact if exploited. 6. Plan for an update or patch deployment once the vendor releases a fix, and consider isolating or replacing the affected system if remediation is delayed. 7. Conduct security awareness training for administrators to recognize and respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-12-16T19:32:09.370Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8bbe

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:43:10 AM

Last updated: 7/31/2025, 6:23:30 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats