Skip to main content

CVE-2024-0464: CWE-89 SQL Injection in code-projects Online Faculty Clearance

Medium
VulnerabilityCVE-2024-0464cvecve-2024-0464cwe-89
Published: Fri Jan 12 2024 (01/12/2024, 18:31:03 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Faculty Clearance

Description

A vulnerability classified as critical has been found in code-projects Online Faculty Clearance 1.0. This affects an unknown part of the file delete_faculty.php of the component HTTP GET Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250569 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:10:28 UTC

Technical Analysis

CVE-2024-0464 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Faculty Clearance application. The vulnerability exists in the delete_faculty.php script, specifically in the handling of the HTTP GET parameter 'id'. An attacker can manipulate this parameter to inject malicious SQL code, potentially altering the intended SQL query executed by the backend database. This type of injection can lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the database. The vulnerability is remotely exploitable without user interaction, requiring only low privileges (PR:L) on the system, which suggests that an attacker with limited access could leverage this flaw. The CVSS 3.1 base score is 6.3, categorized as medium severity, reflecting the potential for limited impact on confidentiality, integrity, and availability. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. The absence of available patches or mitigations from the vendor further elevates the threat level for users of this specific application version. The CWE-89 classification confirms this is a classic SQL Injection issue, a well-understood and critical web application security risk. Given the nature of the affected software—an online faculty clearance system—successful exploitation could disrupt academic administrative processes and expose sensitive faculty data.

Potential Impact

For European organizations, particularly educational institutions using the Online Faculty Clearance system version 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to faculty records, including personal and professional information, potentially violating GDPR and other data protection regulations. Data integrity could be compromised by unauthorized deletion or modification of faculty clearance records, disrupting administrative workflows and causing operational delays. Availability of the clearance system could also be affected if attackers execute destructive SQL commands, leading to denial of service. The medium CVSS score suggests moderate impact, but the critical nature of academic data and regulatory compliance in Europe elevates the practical impact. Additionally, the remote exploitability without user interaction means attackers can automate attacks, increasing the likelihood of widespread exploitation if the system remains unpatched. The lack of known exploits in the wild currently limits immediate risk, but public disclosure increases the urgency for mitigation.

Mitigation Recommendations

European organizations should immediately conduct an inventory to identify any deployments of code-projects Online Faculty Clearance version 1.0. Until a vendor patch is available, organizations should implement the following specific mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'id' parameter in delete_faculty.php. 2) Restrict access to the clearance system to trusted IP ranges or via VPN to reduce exposure. 3) Conduct code reviews and apply manual input validation and parameterized queries or prepared statements in the delete_faculty.php script to sanitize the 'id' parameter, if source code access is possible. 4) Monitor logs for unusual database query patterns or repeated failed attempts to manipulate the 'id' parameter. 5) Implement database-level restrictions such as least privilege for the application database user to limit the impact of any injection. 6) Prepare incident response plans for potential data breaches or service disruptions related to this vulnerability. Organizations should also engage with the vendor or community to obtain patches or updates and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-12T10:30:22.844Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e668b

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 3:10:28 PM

Last updated: 8/14/2025, 10:59:17 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats