Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-24725 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CVE-2024-24725 is a **PHP Deserialization** flaw in Gibbon. πŸ“‰ **Consequences**: Attackers can manipulate the `columnOrder` parameter via POST requests to execute arbitrary code.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **Unsafe Deserialization**. πŸ› The flaw lies in how `modules/System Admin/import_run.PHP` handles input.…

Q3Who is affected? (Versions/Components)

🏫 **Affected**: **Gibbon** School Platform. πŸ“¦ **Version**: **26.0.00 and earlier**. πŸ“… **Published**: March 23, 2024. 🌐 Target: Educational institutions using this specific version.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Hackers Can**: Execute **Remote Code Execution (RCE)**. πŸ”“ Gain full control over the server. πŸ“‚ Access sensitive student/educator data. πŸ”„ Modify system configurations via the `externalAssessment` import module.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **Low**. πŸ“ Requires a **POST request**. 🎯 Specific endpoint: `import_run.PHP&type=externalAssessment&step=4`. πŸ”‘ Auth requirements not specified, but the vector is direct via HTTP parameters.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exploit**: **YES**. πŸ“‚ PoC available on GitHub: `MelkorW/CVE-2024-24725-PoC`. πŸš€ Exploit-DB entry #51903 exists. ⚠️ Wild exploitation is highly likely given the PoC availability.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Gibbon v26.0.00 or older. πŸ“‘ Monitor logs for POST requests to `import_run.PHP` with `type=externalAssessment`. πŸ§ͺ Test the `columnOrder` parameter for deserialization artifacts.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Upgrade Gibbon to a version **newer than 26.0.00**. πŸ“₯ Download latest from `gibbonedu.org/download/`. πŸ”„ Apply vendor patches immediately.…

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Block access to `import_run.PHP`. 🚫 Whitelist IPs for the `System Admin` module. πŸ›‘οΈ Input validation on `columnOrder` if code modification is possible.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **HIGH**. πŸ”₯ Public PoC exists. πŸ’£ RCE impact is critical. 🏫 Schools are high-value targets. ⏳ Patch immediately to prevent data breaches and server takeover.