CVE-2018-16659

9.8 CRITICAL

📋 TL;DR

CVE-2018-16659 is a critical SQL injection vulnerability in Rausoft ID.prove 2.95 that allows attackers to execute arbitrary SQL commands via the login page's Username parameter. This can lead to authentication bypass, data theft, and remote code execution through SQL Server's xp_cmdshell. Organizations using Rausoft ID.prove 2.95 are affected.

💻 Affected Systems

Products:
  • Rausoft ID.prove
Versions: Version 2.95
Operating Systems: Windows (due to SQL Server dependency)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Microsoft SQL Server backend. xp_cmdshell must be enabled for full RCE impact.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via xp_cmdshell leading to domain takeover, data exfiltration, and ransomware deployment.

🟠

Likely Case

Authentication bypass leading to unauthorized access, sensitive data extraction, and potential lateral movement.

🟢

If Mitigated

Limited to SQL injection without command execution if xp_cmdshell is disabled and proper input validation exists.

🌐 Internet-Facing: HIGH - Login pages are typically internet-facing, making exploitation trivial for unauthenticated attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they have network access to the application.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB. Attack requires no authentication and uses simple SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - No official patch documented

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

1. Upgrade to a newer version if available. 2. Apply input validation and parameterized queries. 3. Disable xp_cmdshell in SQL Server.

🔧 Temporary Workarounds

Disable xp_cmdshell

windows

Prevents command execution via SQL injection by disabling the dangerous stored procedure

EXEC sp_configure 'show advanced options', 1;
RECONFIGURE;
EXEC sp_configure 'xp_cmdshell', 0;
RECONFIGURE;

Implement WAF Rules

all

Block SQL injection patterns at the web application firewall

🧯 If You Can't Patch

  • Isolate the ID.prove server in a restricted network segment
  • Implement strict input validation and parameterized queries in the application code

🔍 How to Verify

Check if Vulnerable:

Test login page with SQL injection payload: ' OR '1'='1 in Username field

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Verify parameterized queries are implemented and xp_cmdshell is disabled

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Failed login attempts with SQL syntax
  • xp_cmdshell execution events

Network Indicators:

  • POST requests to login page with SQL payloads
  • Outbound connections from SQL Server to unexpected destinations

SIEM Query:

source="web_logs" AND uri="/login" AND (body CONTAINS "xp_cmdshell" OR body CONTAINS "UNION" OR body CONTAINS "SELECT @@version")

🔗 References

📤 Share & Export