CVE-2024-55460
Published: 18 February 2025
Summary
CVE-2024-55460 is a critical-severity SQL Injection (CWE-89) vulnerability in Boardroomlimited (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user inputs to the login page, directly preventing time-based SQL injection payloads from being processed.
Mandates timely identification, reporting, and correction of flaws like the SQL injection vulnerability in the Dividend Distribution Tax Election System v2.0.
Enforces boundary protection mechanisms such as web application firewalls to monitor and block malicious SQL injection attempts at external interfaces.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated RCE via SQLi on public-facing login page (T1190); enables arbitrary command execution on server (T1059).
NVD Description
A time-based SQL injection vulnerability in the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 allows attackers to execute arbitrary code via a crafted input.
Deeper analysisAI
CVE-2024-55460 is a time-based SQL injection vulnerability affecting the login page of BoardRoom Limited Dividend Distribution Tax Election System version v2.0. This flaw, classified under CWE-89, enables attackers to execute arbitrary code through specially crafted input. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), reflecting its high severity due to network accessibility, low attack complexity, and no requirements for privileges or user interaction.
Remote, unauthenticated attackers can exploit this vulnerability by submitting malicious payloads to the login page, leveraging time-based blind SQL injection techniques to infer data and escalate to arbitrary code execution. Successful exploitation grants high-impact access, compromising confidentiality, integrity, and availability of the affected system, potentially allowing full control over the server hosting the Dividend Distribution Tax Election System.
Advisories and further details are available in referenced sources, including a GitHub repository at https://github.com/Ap0k4L1p5/CVE-research/tree/master/CVE-2024-55460 containing exploit research, and the affected login endpoint at https://sgsrs.boardroomlimited.com/taxelection/login.aspx. No specific patches or mitigation steps are detailed in the provided information.
Details
- CWE(s)