CVE-2015-9249

9.8 CRITICAL

📋 TL;DR

CVE-2015-9249 is a SQL injection vulnerability in Skybox Platform's VersionWebService SOAP endpoint. Attackers can execute arbitrary SQL commands by sending specially crafted SOAP requests to /skyboxview/webservice/services/VersionWebService. This affects Skybox Platform installations before version 7.5.201.

💻 Affected Systems

Products:
  • Skybox Platform
Versions: All versions before 7.5.201
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default SOAP web service configuration and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Skybox Platform database, allowing data theft, modification, or deletion, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized access to sensitive network security data stored in the platform, configuration manipulation, and privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation preventing exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web services and can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows attackers with network access to compromise the platform and potentially pivot to other systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory includes detailed exploitation examples showing how to craft malicious SOAP requests to trigger SQL injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.201 or later

Vendor Advisory: https://www.skyboxsecurity.com/

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Skybox Platform version 7.5.201 or later from vendor portal. 3. Follow vendor upgrade documentation to apply the update. 4. Restart Skybox services. 5. Verify the fix by checking the version and testing the vulnerable endpoint.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to the vulnerable endpoint using firewall rules or network segmentation.

iptables -A INPUT -p tcp --dport 443 -s trusted_networks -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules to block malicious SOAP requests.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in the application code
  • Disable the vulnerable VersionWebService endpoint if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check the Skybox Platform version via admin interface or by examining the SOAP response from /skyboxview/webservice/services/VersionWebService?wsdl

Check Version:

curl -k https://<skybox_host>/skyboxview/webservice/services/VersionWebService?wsdl | grep -i version

Verify Fix Applied:

After patching, attempt to reproduce the SQL injection using the proof-of-concept from the advisory and verify it fails.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • SOAP requests with suspicious SQL keywords in the body
  • Failed authentication attempts to the VersionWebService

Network Indicators:

  • HTTP POST requests to /skyboxview/webservice/services/VersionWebService containing SQL syntax
  • Unusual database connection patterns from the Skybox application server

SIEM Query:

source="skybox_logs" AND (url="/skyboxview/webservice/services/VersionWebService" AND (body="*SELECT*" OR body="*UNION*" OR body="*INSERT*" OR body="*DELETE*"))

🔗 References

📤 Share & Export