Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48465: n/a

0
Critical
VulnerabilityCVE-2024-48465cvecve-2024-48465
Published: Mon Oct 28 2024 (10/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The MRBS version 1.5.0 has an SQL injection vulnerability in the edit_entry_handler.php file, specifically in the rooms%5B%5D parameter

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:31:02 UTC

Technical Analysis

The vulnerability identified as CVE-2024-48465 affects MRBS (Meeting Room Booking System) version 1.5.0 and is classified as an SQL injection flaw located in the edit_entry_handler.php script, specifically through the rooms[] parameter. SQL injection (CWE-89) vulnerabilities allow attackers to inject malicious SQL statements into an application's database query, potentially leading to unauthorized data access, data manipulation, or complete system compromise. This particular flaw requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with impacts on confidentiality, integrity, and availability of the affected system. Exploiting this vulnerability could allow attackers to extract sensitive information, modify or delete data, or disrupt service availability. MRBS is used by various organizations for managing room bookings, and a successful attack could compromise operational data and user privacy. No patches or exploit code are currently publicly available, but the vulnerability is published and known, increasing the risk of future exploitation. The lack of a patch means organizations must rely on mitigation strategies until an official fix is released.

Potential Impact

The impact of CVE-2024-48465 is severe due to the critical nature of the SQL injection vulnerability. Organizations using MRBS 1.5.0 risk unauthorized disclosure of sensitive booking and user data, unauthorized modification or deletion of database records, and potential denial of service conditions. This can lead to operational disruptions, loss of trust, regulatory compliance violations, and potential lateral movement within the network if attackers leverage the compromised system as a foothold. Since the vulnerability requires no authentication and no user interaction, it can be exploited by any remote attacker scanning for vulnerable MRBS instances. The scope includes all organizations deploying the affected MRBS version, particularly those in sectors relying on room booking systems for scheduling and resource management. The absence of known exploits currently limits immediate widespread impact, but the high severity score and public disclosure increase the likelihood of future attacks.

Mitigation Recommendations

1. Immediately restrict external access to MRBS 1.5.0 instances by network segmentation or firewall rules to limit exposure. 2. Monitor web server logs for suspicious requests targeting edit_entry_handler.php and the rooms[] parameter to detect potential exploitation attempts. 3. Implement a Web Application Firewall (WAF) with SQL injection detection and prevention rules tailored to block malicious payloads targeting MRBS. 4. Review and sanitize all user inputs in the application code, especially the rooms[] parameter, to prevent SQL injection; if possible, apply prepared statements or parameterized queries. 5. Engage with MRBS maintainers or community to obtain or request an official patch or upgrade to a fixed version once available. 6. Conduct regular vulnerability scans and penetration tests focusing on web application security to identify similar injection flaws. 7. Educate system administrators and developers about secure coding practices and the risks of SQL injection vulnerabilities. 8. Maintain up-to-date backups of MRBS databases to enable recovery in case of data compromise or destruction.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b72b7ef31ef0b555811

Added to database: 2/25/2026, 9:36:50 PM

Last enriched: 2/27/2026, 9:31:02 PM

Last updated: 4/11/2026, 6:38:35 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses