Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2022-28079 โ€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: SQL Injection in `course_code` param. ๐Ÿ“‰ **Consequences**: App compromise, data access/modification. ๐Ÿ’ฅ **Impact**: Critical integrity loss.

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **CWE**: SQL Injection (Implicit). ๐Ÿ” **Flaw**: Unsanitized input in `/admin/asign-single-student-subjects.php`. โŒ **Root**: Direct query concatenation.

Q3Who is affected? (Versions/Components)

๐ŸŽ“ **Product**: College Management System v1.0. ๐Ÿข **Vendor**: Code Projects. ๐Ÿ“ฆ **Component**: Admin module (`asign-single-student-subjects.php`).

Q4What can hackers do? (Privileges/Data)

๐Ÿ‘ฎ **Privileges**: Authenticated user access. ๐Ÿ—„๏ธ **Data**: Read/Modify DB records. ๐Ÿ”„ **Action**: Arbitrary SQL execution. ๐Ÿ“‚ **Scope**: Student/Subject data.

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ” **Auth**: REQUIRED (Authenticated). โš™๏ธ **Config**: Admin panel access. ๐Ÿ“‰ **Threshold**: Medium (Need valid creds). ๐Ÿšง **Barrier**: Not remote unauth.

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ’ป **Exp**: Yes, public PoC available. ๐Ÿ“‚ **Repo**: GitHub (erengozaydin). ๐Ÿ› ๏ธ **Tool**: SQLmap compatible. ๐ŸŒ **Status**: Active exploitation possible.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Check**: Intercept `course_code` in Burp. ๐Ÿ“ **Test**: Send `poc.req` to SQLmap. ๐Ÿš€ **Scan**: Use Nuclei templates. ๐Ÿ“Š **Indicator**: DB error responses.

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿšซ **Patch**: No official fix mentioned. ๐Ÿ“… **Date**: Disclosed May 2022. ๐Ÿ›‘ **Status**: Unpatched legacy code. ๐Ÿ“ž **Vendor**: Code Projects (Inactive?).

Q9What if no patch? (Workaround)

๐Ÿ›ก๏ธ **Workaround**: Restrict admin access. ๐Ÿšซ **Input**: Validate `course_code` strictly. ๐Ÿงฑ **WAF**: Block SQL keywords. ๐Ÿ”’ **Network**: Limit DB port exposure.

Q10Is it urgent? (Priority Suggestion)

โš ๏ธ **Priority**: High (if authenticated). ๐Ÿ“ˆ **Risk**: Data breach potential. ๐Ÿƒ **Action**: Patch or isolate immediately. ๐Ÿšจ **Urgency**: Critical for affected admins.