Skip to main content

CVE-2024-0497: CWE-89 SQL Injection in Campcodes Student Information System

Medium
VulnerabilityCVE-2024-0497cvecve-2024-0497cwe-89
Published: Sat Jan 13 2024 (01/13/2024, 17:31:03 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Student Information System

Description

A vulnerability was found in Campcodes Student Information System 1.0. It has been classified as critical. Affected is an unknown function of the file /classes/Users.php?f=save. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250602 is the identifier assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/11/2025, 22:46:11 UTC

Technical Analysis

CVE-2024-0497 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Student Information System, specifically within the /classes/Users.php file's save function. The vulnerability arises from improper sanitization or validation of the 'username' parameter, which is directly used in SQL queries. This flaw allows an attacker to inject malicious SQL code remotely without requiring user interaction, potentially manipulating the backend database. The vulnerability is classified under CWE-89 (SQL Injection), a common and critical web application security issue. Exploiting this vulnerability can lead to unauthorized data access, data modification, or even denial of service by corrupting or deleting data. Although no public exploits have been observed in the wild yet, the exploit details have been disclosed publicly, increasing the risk of exploitation. The CVSS v3.1 base score is 6.3 (medium severity), reflecting the network attack vector, low attack complexity, requirement of privileges (PR:L), no user interaction, and impacts on confidentiality, integrity, and availability, albeit at a limited level. The vulnerability affects only version 1.0 of the product, and no official patches have been released at the time of this report.

Potential Impact

For European organizations using Campcodes Student Information System 1.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of student data and related educational records. Successful exploitation could lead to unauthorized disclosure of sensitive personal information, such as student identities, grades, and attendance records, potentially violating GDPR and other data protection regulations. Integrity impacts could allow attackers to alter student records, undermining trust in the system and causing operational disruptions. Availability impacts could disrupt educational services, affecting administrative workflows and student access. Given the critical nature of educational data and the regulatory environment in Europe, exploitation could result in legal penalties, reputational damage, and operational challenges. The requirement for some level of privilege (PR:L) suggests that attackers may need to have some authenticated access or leverage other vulnerabilities to escalate privileges, which slightly reduces the immediate risk but does not eliminate it, especially if default or weak credentials are used.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the vulnerable endpoint (/classes/Users.php?f=save) through network segmentation and firewall rules, limiting it to trusted internal networks or VPN users only. 2. Implement strict input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. 3. Conduct a thorough code review and security audit of the entire application to identify and remediate similar injection flaws. 4. Enforce strong authentication and access control policies to minimize the risk posed by the privilege requirement. 5. Monitor application logs and database activity for unusual queries or access patterns indicative of exploitation attempts. 6. If possible, upgrade to a patched version once available or apply vendor-provided patches promptly. 7. Educate administrators and users about the risks and signs of exploitation to enhance detection and response capabilities. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-12T12:32:36.423Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f531b0bd07c39389e7b

Added to database: 6/10/2025, 6:54:11 PM

Last enriched: 7/11/2025, 10:46:11 PM

Last updated: 8/17/2025, 8:47:57 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats