Skip to main content

CVE-2024-1197: CWE-89 SQL Injection in SourceCodester Testimonial Page Manager

High
VulnerabilityCVE-2024-1197cvecve-2024-1197cwe-89
Published: Fri Feb 02 2024 (02/02/2024, 22:31:03 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Testimonial Page Manager

Description

A vulnerability, which was classified as critical, has been found in SourceCodester Testimonial Page Manager 1.0. This issue affects some unknown processing of the file delete-testimonial.php of the component HTTP GET Request Handler. The manipulation of the argument testimony leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-252695.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:27:29 UTC

Technical Analysis

CVE-2024-1197 is a critical SQL Injection vulnerability identified in SourceCodester Testimonial Page Manager version 1.0, specifically within the delete-testimonial.php file. This vulnerability arises from improper sanitization of the 'testimony' parameter in HTTP GET requests, allowing an attacker to inject malicious SQL code. Since the vulnerability is exploitable remotely without any authentication or user interaction, an attacker can manipulate the 'testimony' argument to execute arbitrary SQL commands on the backend database. This can lead to unauthorized data disclosure, modification, or deletion, severely impacting the confidentiality, integrity, and availability of the affected system. The CVSS 3.1 base score is 7.3 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects all installations running version 1.0 of the Testimonial Page Manager, a web application component used to manage user testimonials on websites. No patches or fixes have been published yet, and no known exploits are currently reported in the wild. However, given the nature of SQL Injection vulnerabilities, exploitation could lead to database compromise, data leakage, or complete system takeover if leveraged with other vulnerabilities or misconfigurations.

Potential Impact

For European organizations using SourceCodester Testimonial Page Manager 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer or business data stored in the backend database, potentially violating GDPR and other data protection regulations. The integrity of testimonial data and possibly other linked database records could be compromised, undermining trust and damaging reputation. Availability could also be affected if attackers execute destructive SQL commands, leading to service disruption. Organizations in sectors such as e-commerce, hospitality, or any customer-facing services that rely on testimonial management could face operational and compliance challenges. Furthermore, the remote and unauthenticated nature of the exploit increases the likelihood of automated scanning and exploitation attempts, raising the urgency for mitigation in European environments where data privacy and security are heavily regulated.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their use of SourceCodester Testimonial Page Manager version 1.0 and isolate or disable the affected delete-testimonial.php functionality if possible. Since no official patch is available, organizations should implement the following specific measures: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'testimony' parameter. 2) Apply input validation and sanitization at the web server or application layer, ensuring that the 'testimony' parameter only accepts expected input formats and rejects suspicious payloads. 3) Restrict database permissions for the web application user to the minimum necessary, preventing destructive SQL commands even if injection occurs. 4) Monitor web server logs and database logs for unusual query patterns or repeated failed attempts to exploit this vulnerability. 5) Consider migrating to alternative testimonial management solutions or custom-developed modules with secure coding practices. 6) Plan for an update or patch deployment from the vendor once available and prioritize testing and deployment in production environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-02-02T07:47:35.464Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec2d9

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:27:29 PM

Last updated: 8/12/2025, 5:14:44 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats