CVE-2024-0463: CWE-89 SQL Injection in code-projects Online Faculty Clearance
A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /production/admin_view_info.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250568.
AI Analysis
Technical Summary
CVE-2024-0463 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Faculty Clearance application. The vulnerability exists in the HTTP POST request handler within the /production/admin_view_info.php file, specifically through manipulation of the 'haydi' parameter. An attacker can exploit this flaw by injecting malicious SQL code into the 'haydi' argument, which is then executed by the backend database. This can lead to unauthorized access, data leakage, data modification, or disruption of service. The vulnerability is remotely exploitable without user interaction but requires some level of privileges (PR:L) to execute. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with impacts on confidentiality, integrity, and availability rated as low. The attack vector is network-based with low attack complexity and no user interaction needed. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor further elevates the concern for organizations using this software. The CWE classification is CWE-89, which corresponds to SQL Injection, a well-known and critical class of vulnerabilities that can lead to severe consequences if exploited.
Potential Impact
For European organizations, particularly educational institutions or administrative bodies using the Online Faculty Clearance system, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive faculty or student data, manipulation of clearance records, or denial of service, disrupting academic operations. Given the critical nature of educational data and compliance requirements under GDPR, any data breach could result in regulatory penalties and reputational damage. The medium CVSS score suggests that while exploitation requires some privileges, the potential for lateral movement or privilege escalation exists if attackers gain initial access. The remote exploitability without user interaction increases the threat surface, especially if the application is exposed to the internet or accessible within internal networks. The absence of patches means organizations must rely on compensating controls, increasing operational overhead and risk.
Mitigation Recommendations
Organizations should immediately conduct a thorough audit of all instances of the Online Faculty Clearance 1.0 application to identify exposure. As no official patches are available, mitigation should focus on restricting access to the vulnerable endpoint via network segmentation and firewall rules, limiting HTTP POST requests to trusted IP addresses only. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'haydi' parameter is critical. Additionally, input validation and parameterized queries should be enforced if organizations have the capability to modify the source code. Monitoring and logging all access to /production/admin_view_info.php for anomalous activity can provide early detection of exploitation attempts. Organizations should also consider isolating the application from sensitive databases or migrating to updated, supported software versions where possible. Finally, staff training on secure coding and incident response preparedness will help mitigate risks associated with this and similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-0463: CWE-89 SQL Injection in code-projects Online Faculty Clearance
Description
A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /production/admin_view_info.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250568.
AI-Powered Analysis
Technical Analysis
CVE-2024-0463 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Faculty Clearance application. The vulnerability exists in the HTTP POST request handler within the /production/admin_view_info.php file, specifically through manipulation of the 'haydi' parameter. An attacker can exploit this flaw by injecting malicious SQL code into the 'haydi' argument, which is then executed by the backend database. This can lead to unauthorized access, data leakage, data modification, or disruption of service. The vulnerability is remotely exploitable without user interaction but requires some level of privileges (PR:L) to execute. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with impacts on confidentiality, integrity, and availability rated as low. The attack vector is network-based with low attack complexity and no user interaction needed. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor further elevates the concern for organizations using this software. The CWE classification is CWE-89, which corresponds to SQL Injection, a well-known and critical class of vulnerabilities that can lead to severe consequences if exploited.
Potential Impact
For European organizations, particularly educational institutions or administrative bodies using the Online Faculty Clearance system, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive faculty or student data, manipulation of clearance records, or denial of service, disrupting academic operations. Given the critical nature of educational data and compliance requirements under GDPR, any data breach could result in regulatory penalties and reputational damage. The medium CVSS score suggests that while exploitation requires some privileges, the potential for lateral movement or privilege escalation exists if attackers gain initial access. The remote exploitability without user interaction increases the threat surface, especially if the application is exposed to the internet or accessible within internal networks. The absence of patches means organizations must rely on compensating controls, increasing operational overhead and risk.
Mitigation Recommendations
Organizations should immediately conduct a thorough audit of all instances of the Online Faculty Clearance 1.0 application to identify exposure. As no official patches are available, mitigation should focus on restricting access to the vulnerable endpoint via network segmentation and firewall rules, limiting HTTP POST requests to trusted IP addresses only. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'haydi' parameter is critical. Additionally, input validation and parameterized queries should be enforced if organizations have the capability to modify the source code. Monitoring and logging all access to /production/admin_view_info.php for anomalous activity can provide early detection of exploitation attempts. Organizations should also consider isolating the application from sensitive databases or migrating to updated, supported software versions where possible. Finally, staff training on secure coding and incident response preparedness will help mitigate risks associated with this and similar vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-12T10:30:19.531Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec961
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 2:40:31 PM
Last updated: 8/11/2025, 1:45:52 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.