CVE-2016-6566

9.8 CRITICAL

📋 TL;DR

This is a critical SQL injection vulnerability in Sungard eTRAKiT3 software that allows unauthenticated remote attackers to execute arbitrary SQL commands on the backend database. It affects version 3.2.1.17 and potentially other versions of the eTRAKiT3 platform. Organizations using this software for case management are at risk of data breaches and system compromise.

💻 Affected Systems

Products:
  • Sungard eTRAKiT3
Versions: 3.2.1.17 (other versions may also be vulnerable)
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of eTRAKiT3 case management software. The vulnerability exists in the login parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, authentication bypass, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized access to sensitive case management data, extraction of personally identifiable information, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation preventing database access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via POST parameter requires minimal technical skill. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Sungard for patched version

Vendor Advisory: https://www.kb.cert.org/vuls/id/846103

Restart Required: Yes

Instructions:

1. Contact Sungard for the latest patched version of eTRAKiT3
2. Apply the vendor-provided patch
3. Restart the eTRAKiT3 application services
4. Test functionality after patching

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious payloads

Input Validation Filter

all

Implement input validation to reject suspicious characters in the ucLogin_txtLoginId_ClientStat parameter

🧯 If You Can't Patch

  • Isolate the eTRAKiT3 server in a segmented network zone with strict access controls
  • Implement database-level protections including least privilege accounts and query logging

🔍 How to Verify

Check if Vulnerable:

Test by sending a crafted POST request to the login endpoint with SQL injection payload in ucLogin_txtLoginId_ClientStat parameter

Check Version:

Check eTRAKiT3 version in application interface or configuration files

Verify Fix Applied:

Verify the patch prevents SQL injection by testing with the same payloads that previously worked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL syntax in parameters
  • Database query logs showing unexpected SQL commands

Network Indicators:

  • POST requests to login endpoint containing SQL keywords in parameters
  • Unusual database connection patterns from application server

SIEM Query:

source="eTRAKiT3" AND (message="SQL" OR message="syntax" OR parameter="*SELECT*" OR parameter="*UNION*")

🔗 References

📤 Share & Export