Skip to main content

CVE-2024-0272: CWE-89 SQL Injection in Kashipara Food Management System

Medium
VulnerabilityCVE-2024-0272cvecve-2024-0272cwe-89
Published: Sun Jan 07 2024 (01/07/2024, 10:31:03 UTC)
Source: CVE
Vendor/Project: Kashipara
Product: Food Management System

Description

A vulnerability was found in Kashipara Food Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file addmaterialsubmit.php. The manipulation of the argument material_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249827.

AI-Powered Analysis

AILast updated: 07/04/2025, 16:57:34 UTC

Technical Analysis

CVE-2024-0272 is a critical SQL Injection vulnerability identified in the Kashipara Food Management System version 1.0. The vulnerability arises from improper sanitization of the 'material_name' parameter in the addmaterialsubmit.php file, allowing an attacker to inject malicious SQL code remotely. This flaw falls under CWE-89, which pertains to SQL Injection vulnerabilities that enable attackers to manipulate backend SQL queries. Exploiting this vulnerability could allow an attacker to read, modify, or delete data within the underlying database, potentially leading to unauthorized data disclosure, data corruption, or disruption of service. The vulnerability is remotely exploitable without user interaction but requires low privileges (PR:L) on the system. The CVSS v3.1 base score is 6.3 (medium severity), reflecting the network attack vector, low attack complexity, and impacts on confidentiality, integrity, and availability, albeit with limited scope and privileges. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. No patches have been released yet, which leaves affected systems exposed if not mitigated by other means.

Potential Impact

For European organizations using the Kashipara Food Management System, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of sensitive food management data. Potential impacts include unauthorized access to proprietary or customer data, manipulation of inventory or supply chain records, and disruption of food management operations. Such disruptions could affect food safety compliance, inventory accuracy, and operational continuity, potentially leading to financial losses, regulatory penalties, and reputational damage. Given the critical nature of food supply chains and the increasing regulatory scrutiny in Europe (e.g., GDPR for data protection and food safety regulations), exploitation of this vulnerability could have severe operational and legal consequences. Additionally, if attackers leverage this vulnerability to pivot within a network, broader organizational systems could be compromised.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and sanitization on the 'material_name' parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. 2) Restricting database user privileges associated with the Food Management System to the minimum necessary, preventing unauthorized data manipulation. 3) Monitoring and logging database queries and web application inputs for suspicious activity indicative of SQL injection attempts. 4) Conducting thorough code reviews and penetration testing focused on SQL injection vectors within the application. 5) Isolating the Food Management System network segment to limit lateral movement in case of compromise. 6) Preparing for rapid deployment of patches once available and maintaining up-to-date backups to enable recovery from potential data corruption or ransomware attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-06T10:14:01.187Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebdc3

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 4:57:34 PM

Last updated: 7/30/2025, 3:50:34 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats