Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34479: n/a

0
Critical
VulnerabilityCVE-2024-34479cvecve-2024-34479
Published: Wed Aug 07 2024 (08/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

SourceCodester Computer Laboratory Management System 1.0 allows classes/Master.php id SQL Injection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 23:19:56 UTC

Technical Analysis

CVE-2024-34479 identifies a critical SQL Injection vulnerability in the SourceCodester Computer Laboratory Management System version 1.0. The flaw exists in the classes/Master.php file, where the id parameter is improperly sanitized, allowing attackers to inject malicious SQL queries. This vulnerability is classified under CWE-89, which pertains to improper neutralization of special elements used in SQL commands. The CVSS 3.1 base score of 9.8 indicates a critical severity due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability enables remote attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or complete system compromise. The vulnerability was reserved in May 2024 and published in August 2024, but no official patches or fixes have been released yet. While no known exploits have been reported in the wild, the critical nature and ease of exploitation make it a high-priority issue for affected organizations. The vulnerability primarily affects installations of the SourceCodester Computer Laboratory Management System 1.0, a niche product used in educational and laboratory environments for managing computer labs.

Potential Impact

The impact of CVE-2024-34479 is severe for organizations using the affected software. Successful exploitation can lead to full compromise of the backend database, exposing sensitive information such as user credentials, personal data, and operational records. Attackers could alter or delete critical data, disrupting laboratory management operations and potentially causing significant downtime. The integrity and availability of the system are at risk, which could affect educational institutions relying on this system for daily operations. Additionally, data breaches resulting from this vulnerability could lead to regulatory penalties and reputational damage. Given the vulnerability requires no authentication or user interaction, the attack surface is broad, increasing the likelihood of exploitation if unmitigated. Organizations worldwide using this software in educational or research environments face a high risk of targeted attacks, especially if they have internet-facing deployments.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on all user-supplied parameters, especially the id parameter in classes/Master.php, to prevent malicious SQL code injection. Employ parameterized queries or prepared statements in the application code to eliminate direct concatenation of user input into SQL commands. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL Injection attempts targeting this vulnerability. Monitor database logs and application behavior for unusual queries or access patterns indicative of exploitation attempts. Restrict network access to the affected system, limiting exposure to trusted internal networks where possible. Conduct thorough code reviews and penetration testing to identify and remediate similar vulnerabilities. Finally, maintain regular backups of critical data to enable recovery in case of data corruption or deletion.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c51b7ef31ef0b56286e

Added to database: 2/25/2026, 9:40:33 PM

Last enriched: 3/4/2026, 11:19:56 PM

Last updated: 4/12/2026, 3:43:27 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses