CVE-2024-57638
Published: 14 January 2025
Summary
CVE-2024-57638 is a high-severity SQL Injection (CWE-89) vulnerability in Openlinksw Virtuoso. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 47.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection attacks by validating and sanitizing crafted SQL statements input to the dfe_body_copy component.
Remediates the specific flaw in Virtuoso v7.2.11 through timely patching as detailed in the vendor's GitHub issue.
Mitigates the high availability impact of DoS by implementing protections against resource exhaustion triggered by SQL injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated SQL injection in public-facing DB server directly enables T1190 for initial access and T1499.004 for application exploitation causing DoS.
NVD Description
An issue in the dfe_body_copy component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
Deeper analysisAI
CVE-2024-57638 affects the dfe_body_copy component in OpenLink Virtuoso Open-Source version 7.2.11. The vulnerability enables attackers to trigger a Denial of Service (DoS) condition by sending crafted SQL statements, stemming from CWE-89 (Improper Neutralization of Special Elements used in an SQL Command, or SQL Injection). It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high availability impact with no effects on confidentiality or integrity.
Remote attackers require no privileges, authentication, or user interaction to exploit this over the network with low attack complexity. Exploitation disrupts service availability, potentially rendering the affected Virtuoso instance unresponsive.
Mitigation details are available in the GitHub issue at https://github.com/openlink/virtuoso-opensource/issues/1190.
Details
- CWE(s)