Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-36837 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in CRMEB v5.2.2. πŸ’₯ **Consequences**: Remote attackers can steal sensitive data via the `getProductList` function in `ProductController.php`.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper input validation in `ProductController.php`. ⚠️ **Flaw**: The `getProductList` function allows malicious SQL payloads to execute, bypassing security controls.

Q3Who is affected? (Versions/Components)

🎯 **Affected**: Zhongbang CRMEB. πŸ“¦ **Version**: Specifically **v5.2.2** and potentially higher versions (e.g., CRMEB-KY v5.2.2+). 🏒 **Vendor**: Zhongbang Network (Xi'an).

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Extract sensitive information from the database. πŸ”“ **Privileges**: Remote, unauthenticated access to critical data via the API endpoint.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. 🌐 **Auth**: No authentication required. βš™οΈ **Config**: Exploitable via standard HTTP GET requests to the `/api/products` endpoint.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exp?**: **YES**. πŸ“‚ **PoCs**: Available on GitHub (phtcloud-dev, lhc321-source). πŸ› οΈ **Tools**: Works with `sqlmap` and custom Python scripts.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for `CRMEB` in body or specific CSS icons. πŸ“‘ **API Test**: Send crafted SQL payloads to `/api/products?limit=20&priceOrder=&salesOrder=&selectId=`.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: Data does not mention an official patch. ⚠️ **Status**: Vulnerability disclosed June 2024; assume **UNPATCHED** until verified.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: Block external access to `/api/products`. 🚧 **Mitigation**: Implement WAF rules to filter SQL injection patterns in query parameters.

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Urgency**: **HIGH**. πŸš€ **Priority**: Critical due to easy exploitation and data exposure. πŸƒ **Action**: Patch immediately or isolate the API endpoint.