Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-29875 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in Sentrifugo HRMS. πŸ“‰ **Consequences**: Attackers can extract **ALL** data from the server. Critical integrity & confidentiality loss.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-89** (SQL Injection). πŸ› **Flaw**: Unsafe handling of the `sort_name` parameter in `/sentrifugo/index.php/default/reports/exportactiveuserrpt`.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **Sentrifugo** HR Management System. πŸ“¦ **Version**: Specifically **v3.2**. 🏒 **Vendor**: Sentrifugo.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Capabilities**: Execute malicious SQL queries. πŸ”“ **Impact**: Full data extraction (High Confidentiality/Integrity/Availability impact). CVSS Score: **9.8** (Critical).

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. 🚫 **Auth**: No authentication required (`PR:N`). 🌐 **Network**: Remote (`AV:N`). πŸ–±οΈ **UI**: No user interaction needed (`UI:N`). Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exp**: **No** public PoC/Exploit listed in data. πŸ“ **Ref**: Incibe CERT advisory available. ⚠️ **Risk**: Despite no public code, the flaw is well-defined.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for `/sentrifugo/index.php/default/reports/exportactiveuserrpt`. πŸ§ͺ **Test**: Inject SQL payloads into `sort_name` param. πŸ“‘ **Tool**: Use SQLMap or manual Burp Suite requests.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Check vendor for official patch. πŸ“… **Published**: 2024-03-21. πŸ”„ **Action**: Update to patched version immediately if available.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Block access to `/sentrifugo/.../exportactiveuserrpt`. πŸ›‘οΈ **Defense**: Use WAF rules to filter SQL injection patterns in `sort_name`. πŸ”’ **Input Validation**: Sanitize all inputs.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: Patch ASAP. CVSS 9.8 means high risk. Remote, unauthenticated, full data loss potential. Do not ignore!