Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46374: n/a

0
Critical
VulnerabilityCVE-2024-46374cvecve-2024-46374
Published: Wed Sep 18 2024 (09/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Best House Rental Management System 1.0 contains a SQL injection vulnerability in the delete_category() function of the file rental/admin_class.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:21:05 UTC

Technical Analysis

CVE-2024-46374 identifies a critical SQL injection vulnerability in the Best House Rental Management System version 1.0. The flaw resides in the delete_category() function located in the rental/admin_class.php file, where user-supplied input is improperly sanitized before being incorporated into SQL queries. This lack of input validation allows attackers to inject malicious SQL code remotely without requiring authentication or user interaction. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), which is a common and dangerous web application security issue. The CVSS v3.1 base score of 9.8 reflects the vulnerability's high exploitability (network vector, low attack complexity, no privileges required, no user interaction) and severe impact on confidentiality, integrity, and availability. Exploiting this vulnerability could enable attackers to retrieve sensitive data, modify or delete database records, or execute administrative operations on the backend database, potentially leading to full system compromise. Although no patches or known exploits have been published yet, the critical nature of this vulnerability demands immediate attention from organizations using this software. The absence of a patch increases the risk of future exploitation attempts. The vulnerability affects all deployments of Best House Rental Management System 1.0, which is typically used by property management companies and real estate agencies to manage rental listings and categories.

Potential Impact

The impact of CVE-2024-46374 is severe for organizations using the Best House Rental Management System 1.0. Attackers can remotely execute arbitrary SQL commands without authentication, leading to unauthorized data access, data corruption, or deletion. This compromises the confidentiality of tenant and property data, the integrity of rental management records, and the availability of the system. Such breaches can result in financial losses, legal liabilities due to data privacy violations, reputational damage, and operational disruptions. Given the criticality and ease of exploitation, attackers could leverage this vulnerability to pivot into broader network compromise or ransomware deployment. The lack of a patch and the public disclosure of the vulnerability increase the urgency for organizations to implement mitigations. The threat is particularly impactful for small to medium-sized property management firms that may lack robust cybersecurity defenses.

Mitigation Recommendations

To mitigate CVE-2024-46374, organizations should immediately implement the following measures: 1) Apply strict input validation and sanitization on all user inputs in the delete_category() function and other database-interacting code to prevent SQL injection. Use parameterized queries or prepared statements instead of dynamic SQL concatenation. 2) Restrict database user permissions to the minimum necessary, ensuring the application database user cannot perform destructive operations beyond its scope. 3) Monitor application logs and database logs for unusual queries or access patterns indicative of injection attempts. 4) Employ Web Application Firewalls (WAFs) with SQL injection detection rules to block malicious payloads at the network perimeter. 5) Isolate the rental management system in a segmented network zone to limit lateral movement if compromised. 6) Regularly back up databases and verify backup integrity to enable recovery from data corruption or deletion. 7) Engage with the software vendor or community to track patch releases and apply updates promptly once available. 8) Conduct security code reviews and penetration testing focused on injection vulnerabilities in the application. These targeted steps go beyond generic advice by focusing on code-level fixes, access control, and proactive monitoring tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56aba5

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/28/2026, 7:21:05 AM

Last updated: 4/12/2026, 5:08:36 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses