Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-29874 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in Sentrifugo HRM. πŸ“‰ **Consequences**: Attackers can extract **ALL** database data via crafted queries. Critical integrity & confidentiality loss.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-89**: Improper Neutralization of Special Elements used in an SQL Command. πŸ› **Flaw**: Unsanitized `sort_name` parameter in `/sentrifugo/index.php/default/reports/activeuserrptpdf`.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Sentrifugo. πŸ“¦ **Product**: Sentrifugo HRM System. πŸ“… **Version**: Specifically **v3.2** is affected. Check your deployment version immediately!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: No Auth Required (PR:N). πŸ“‚ **Data**: High Impact (C:H, I:H, A:H). Hackers can read, modify, and delete **everything** in the HR database.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. 🚫 **Auth**: None needed (PR:N). 🌐 **Network**: Remote (AV:N). πŸ–±οΈ **UI**: None needed (UI:N). Extremely easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp**: No specific PoC code provided in data. ⚠️ **Risk**: High CVSS score (9.8) suggests wild exploitation potential. Assume it's being actively targeted.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for `/sentrifugo/index.php/default/reports/activeuserrptpdf`. πŸ§ͺ **Test**: Inject SQL payloads into the `sort_name` parameter. πŸ“‘ **Tools**: Use SQLMap or manual Burp Suite requests.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Patch**: Update to latest version immediately. πŸ“’ **Source**: Refer to Incibe CERT advisory for official vendor guidance. πŸ”„ **Action**: Apply vendor patches ASAP.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Block external access to the `/reports/activeuserrptpdf` endpoint. πŸ›‘ **Mitigation**: Implement WAF rules to filter SQL injection patterns in `sort_name`.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: CRITICAL. 🚨 **Urgency**: Immediate action required. CVSS 9.8 means it's a 'Critical' severity. Do not ignore this! Patch now.