SourceCodester House Rental Management System 1.0 Edit User manage_user.php id/name/username sql injection

Overview

A vulnerability was found in SourceCodester House Rental Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file manage_user.php of the component Edit User. The manipulation of the argument id/name/username leads to sql injection. Using CWE to declare the problem leads to CWE-89. The weakness was published 01/12/2024. The advisory is available at drive.google.com. This vulnerability is handled as CVE-2024-0502. The attack may be launched remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1505 by the MITRE ATT&CK project. It is declared as Proof-of-Concept. The exploit is available at drive.google.com. As 0-day the estimated underground price was around $0-$5k. [Details]

IOB - Indicator of Behavior (487)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

en386
sv14
de14
ja12
it10

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

IOC - Indicator of Compromise (16)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeActorTypeConfidence
13.121.109.0/24Cobalt StrikepredictiveHigh
23.123.17.0/24PandapredictiveHigh
3XX.XXX.XX.X/XXXxxxxxxxpredictiveHigh
4XX.XX.XXX.X/XXXxxxxx XxxxxxxpredictiveHigh
5XX.XX.XXX.X/XXXxxxxxpredictiveHigh
6XX.XX.XXX.X/XXXxxxxpredictiveHigh
7XX.XXX.XXX.X/XXXxxxxpredictiveHigh
8XX.XXX.XXX.X/XXXxxxxxxxxpredictiveHigh
9XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
10XX.X.XXX.X/XXXxxxpredictiveHigh
11XXX.XXX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
12XXX.XX.XX.X/XXXxxxxpredictiveHigh
13XXX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
14XXX.XXX.X.X/XXXxxxxx Xxxxxx Xx XxxxxxxpredictiveHigh
15XXX.XXX.XXX.X/XXXxxxxx XxxxxxpredictiveHigh
16XXX.XXX.XX.X/XXXxxxxpredictiveHigh

TTP - Tactics, Techniques, Procedures (1)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1505CAPEC-108CWE-89SQL InjectionverifiedHigh

IOA - Indicator of Attack (2)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filemanage_user.phpverifiedHigh
2Argumentxx/xxxx/xxxxxxxxverifiedHigh

Interested in the pricing of exploits?

See the underground prices here!