SQL Injection vulnerability from Project Worlds Simple Web Based Chat Application 1.0 (/index.php)
CVE-2024-10432
A vulnerability was found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument username leads to sql injection. This vulnerability is handled as CVE-2024-10432. The attack may be launched remotely. Furthermore, there is an exploit available.
Affected Project: Simple Web Based Chat Application 1.0
Official Website: https://projectworlds.in/simple-web-based-chat-application-using-php-mysql-javascript-ajax/
Version: 1.0
Related Code file: index.php
Injection parameter: username
Vulnerability Description
When sending message, username parameter is vulnerable to SQL injection vulnerability.
Demonstration
User can send message as such:
Intercept the traffic using Burp Suite:
Now copy-paste the traffic and save it in to send.req
and run sqlmap
against it: sqlmap -r send.req --batch --level 5 --risk 3 --dbms mysql
sqlmap
automatically exploits the vulnerability: