CVE-2024-0477: CWE-89 SQL Injection in code-projects Fighting Cock Information System
A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/action/update-deworm.php. The manipulation of the argument usage_deworm leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250582 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0477 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Fighting Cock Information System, specifically within the /admin/action/update-deworm.php file. The vulnerability arises from improper sanitization or validation of the 'usage_deworm' parameter, which an attacker can manipulate to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker with low privileges (PR:L) to execute arbitrary SQL commands on the backend database without requiring user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability of the affected system, as attackers can potentially extract sensitive data, modify or delete records, or disrupt service availability. Although the CVSS score is 6.3 (medium severity), the vulnerability's remote exploitability and potential impact on critical backend data make it a significant threat. No official patches have been released yet, and no known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability is classified under CWE-89, which corresponds to SQL Injection, a well-known and frequently exploited web application security flaw. The Fighting Cock Information System is a niche product, but its use in specific sectors could lead to targeted attacks leveraging this vulnerability.
Potential Impact
For European organizations using the Fighting Cock Information System 1.0, this vulnerability poses a tangible risk of data breaches, unauthorized data manipulation, and potential service disruptions. The SQL Injection flaw could allow attackers to access sensitive customer or operational data, leading to confidentiality breaches and compliance violations under GDPR. Integrity of data could be compromised, affecting business operations and decision-making. Availability could also be impacted if attackers execute destructive queries or cause database crashes. Organizations in sectors such as agriculture, veterinary services, or niche industries where this system might be deployed could face operational downtime and reputational damage. Additionally, the remote exploitability without user interaction increases the risk of automated attacks or exploitation by less skilled adversaries. The lack of patches means organizations must rely on immediate mitigation strategies to protect their systems.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict access to the /admin/action/update-deworm.php endpoint by IP whitelisting or VPN-only access to limit exposure. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection patterns targeting the 'usage_deworm' parameter. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters interacting with SQL queries. If possible, disable or remove the vulnerable functionality until a patch is available. Monitor logs for suspicious activity related to SQL errors or unusual database queries. Regularly back up databases to enable recovery in case of data tampering or loss. Engage with the vendor or community to obtain or develop patches and updates. Finally, perform security assessments and penetration testing to verify the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-0477: CWE-89 SQL Injection in code-projects Fighting Cock Information System
Description
A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/action/update-deworm.php. The manipulation of the argument usage_deworm leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250582 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0477 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Fighting Cock Information System, specifically within the /admin/action/update-deworm.php file. The vulnerability arises from improper sanitization or validation of the 'usage_deworm' parameter, which an attacker can manipulate to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker with low privileges (PR:L) to execute arbitrary SQL commands on the backend database without requiring user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability of the affected system, as attackers can potentially extract sensitive data, modify or delete records, or disrupt service availability. Although the CVSS score is 6.3 (medium severity), the vulnerability's remote exploitability and potential impact on critical backend data make it a significant threat. No official patches have been released yet, and no known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability is classified under CWE-89, which corresponds to SQL Injection, a well-known and frequently exploited web application security flaw. The Fighting Cock Information System is a niche product, but its use in specific sectors could lead to targeted attacks leveraging this vulnerability.
Potential Impact
For European organizations using the Fighting Cock Information System 1.0, this vulnerability poses a tangible risk of data breaches, unauthorized data manipulation, and potential service disruptions. The SQL Injection flaw could allow attackers to access sensitive customer or operational data, leading to confidentiality breaches and compliance violations under GDPR. Integrity of data could be compromised, affecting business operations and decision-making. Availability could also be impacted if attackers execute destructive queries or cause database crashes. Organizations in sectors such as agriculture, veterinary services, or niche industries where this system might be deployed could face operational downtime and reputational damage. Additionally, the remote exploitability without user interaction increases the risk of automated attacks or exploitation by less skilled adversaries. The lack of patches means organizations must rely on immediate mitigation strategies to protect their systems.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict access to the /admin/action/update-deworm.php endpoint by IP whitelisting or VPN-only access to limit exposure. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection patterns targeting the 'usage_deworm' parameter. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters interacting with SQL queries. If possible, disable or remove the vulnerable functionality until a patch is available. Monitor logs for suspicious activity related to SQL errors or unusual database queries. Regularly back up databases to enable recovery in case of data tampering or loss. Engage with the vendor or community to obtain or develop patches and updates. Finally, perform security assessments and penetration testing to verify the effectiveness of mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-12T11:03:27.283Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec8c2
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 1:55:23 PM
Last updated: 8/18/2025, 11:32:30 PM
Views: 14
Related Threats
CVE-2025-9169: Cross Site Scripting in SolidInvoice
MediumCVE-2025-9168: Cross Site Scripting in SolidInvoice
MediumCVE-2025-8364: Address bar spoofing using an blob URI on Firefox for Android in Mozilla Firefox
HighCVE-2025-8042: Sandboxed iframe could start downloads in Mozilla Firefox
HighCVE-2025-8041: Incorrect URL truncation in Firefox for Android in Mozilla Firefox
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.