This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Critical SQL Injection in MasterStudy LMS!** This vulnerability allows attackers to inject malicious SQL code via the `/lms/stm-lms/order/items` REST route. The plugin fails to escape the `user` parameter properly.β¦
π‘οΈ **Root Cause: CWE-89 (SQL Injection)** The flaw is **insufficient escaping** of user-supplied input combined with **lack of prepared statements** in the SQL query.β¦
π£ **Public Exploits Available:** Yes! PoCs are publicly available on GitHub (e.g., `rat-c/CVE-2024-1512`) and in Nuclei templates. Automated scanning tools can already detect and exploit this. β οΈ
Q7How to self-check? (Features/Scanning)
π **Self-Check Methods:** 1. **Scan:** Use Nuclei with the CVE-2024-1512 template. π§ͺ 2. **Verify:** Check if your site uses MasterStudy LMS version β€ 3.2.5. π΅οΈββοΈ 3.β¦
π¨ **Priority: CRITICAL** * **CVSS Score:** 9.8 (Critical). π * **Urgency:** Immediate action required. Public exploits exist, and no auth is needed. Patch immediately to prevent data breaches. β³