SQL Injection vulnerability from Project Worlds Simple Web Based Chat Application 1.0 (/index.php)

CVE-2024-10432

A vulnerability was found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument username leads to sql injection. This vulnerability is handled as CVE-2024-10432. The attack may be launched remotely. Furthermore, there is an exploit available.

Affected Project: Simple Web Based Chat Application 1.0

Official Website: https://projectworlds.in/simple-web-based-chat-application-using-php-mysql-javascript-ajax/

Version: 1.0

Related Code file: index.php

Injection parameter: username

Vulnerability Description

When sending message, username parameter is vulnerable to SQL injection vulnerability.

Demonstration

User can send message as such:

Screenshot from 2024-10-27 02-08-35

Intercept the traffic using Burp Suite:

Screenshot from 2024-10-27 02-11-55

Now copy-paste the traffic and save it in to send.req and run sqlmap against it: sqlmap -r send.req --batch --level 5 --risk 3 --dbms mysql

sqlmap automatically exploits the vulnerability:

image