Multiple vulnerabilities in SiAdmin

Posted date 16/05/2024
Identificador
INCIBE-2024-0262
Importance
5 - Critical
Affected Resources
  • SiAdmin, 1.1 version.
Description

INCIBE has coordinated the publication of 3 vulnerabilities: 2 of critical severity and 1 of medium severity, affecting SiAdmin, version 1.1, a web-based application that uses PHP and MySQL and can automatically generate reports in PDF pages to simplify the administrative process, which have been discovered by Rafael Pedrero.

These vulnerabilities have been assigned the following codes, CVSS v3.1 base score, CVSS vector and CWE vulnerability type for each vulnerability:

  • CVE-2024-4991: 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CWE-89
  • CVE-2024-4992: 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CWE-89
  • CVE-2024-4993: 6.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L | CWE-79
Solution

There is no reported solution at this time.

Detail
  • CVE-2024-4991: vulnerability in SiAdmin 1.1 that allows SQL injection via the /modul/mod_pass/aksi_pass.php parameter in nama_lengkap. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in it.
  • CVE-2024-4992: vulnerability in SiAdmin 1.1 that allows SQL injection via the /modul/mod_kuliah/aksi_kuliah.php parameter in nim. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in it.
  • CVE-2024-4993: vulnerability in SiAdmin 1.1 that allows XSS via the /show.php query parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and thereby steal their cookie session credentials.
References list