Skip to main content

CVE-2024-0280: CWE-89 SQL Injection in Kashipara Food Management System

Medium
VulnerabilityCVE-2024-0280cvecve-2024-0280cwe-89
Published: Sun Jan 07 2024 (01/07/2024, 14:31:03 UTC)
Source: CVE Database V5
Vendor/Project: Kashipara
Product: Food Management System

Description

A vulnerability has been found in Kashipara Food Management System up to 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file item_type_submit.php. The manipulation of the argument type_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249835.

AI-Powered Analysis

AILast updated: 07/04/2025, 00:57:59 UTC

Technical Analysis

CVE-2024-0280 is a SQL Injection vulnerability identified in the Kashipara Food Management System version 1.0. The vulnerability exists in the file item_type_submit.php, specifically in the handling of the 'type_name' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the system then executes. This flaw allows remote exploitation without requiring user interaction, although it does require some level of privileges (PR:L) as indicated by the CVSS vector. The vulnerability impacts confidentiality, integrity, and availability of the affected system by potentially allowing unauthorized data access, data modification, or disruption of service. The CVSS score of 6.3 (medium severity) reflects that while the attack vector is network-based and the attack complexity is low, some privileges are required, and the impact on confidentiality, integrity, and availability is limited but non-negligible. No public exploits are currently known in the wild, and no patches have been released yet. The vulnerability is classified under CWE-89, which is a common and well-understood injection flaw that can lead to significant security breaches if exploited.

Potential Impact

For European organizations using Kashipara Food Management System version 1.0, this vulnerability poses a moderate risk. Food management systems often handle sensitive operational data, including inventory, supplier information, and possibly customer data. Exploitation could lead to unauthorized data disclosure, manipulation of inventory records, or disruption of food supply chain operations. This could result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR if personal data is involved. The remote exploitability increases the risk of external attackers targeting these systems. Given the critical nature of food supply chains and the increasing digitization of such systems in Europe, the vulnerability could impact food service providers, distributors, and retailers relying on this software, potentially causing operational disruptions and data breaches.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the Kashipara Food Management System to trusted internal IPs and VPNs only, minimizing exposure to external threats. 2) Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'type_name' parameter. 3) Conducting thorough input validation and sanitization on all user inputs, especially those interacting with the database, if source code access is possible. 4) Monitoring logs for unusual database queries or errors that may indicate exploitation attempts. 5) Applying the principle of least privilege to database accounts used by the application to limit the potential damage of a successful injection. 6) Preparing an incident response plan specific to this vulnerability to quickly address any exploitation. Organizations should also maintain close communication with Kashipara for any forthcoming patches or updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-06T10:14:29.739Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff412

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 12:57:59 AM

Last updated: 8/10/2025, 9:30:55 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats