CVE-2018-17575

9.8 CRITICAL

📋 TL;DR

CVE-2018-17575 is a SQL injection vulnerability in SWA.JACAD academic software that allows attackers to execute arbitrary SQL commands via the studentId parameter in the password recovery function. This affects all users of SWA Sistemas Acadêmicos version 3.1.37 Build 024. Attackers can potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • SWA Sistemas Acadêmicos (SWA.JACAD)
Versions: 3.1.37 Build 024
Operating Systems: Windows (presumed based on typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the /academico/aluno/esqueci-minha-senha/ endpoint. Other versions may be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover through privilege escalation.

🟠

Likely Case

Unauthorized access to student records, personal information, and academic data stored in the database.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-sensitive data.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface and requires no authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the application.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via URL parameter requires minimal technical skill. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact SWA Sistemas for updated version or implement workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Input Validation Filter

all

Implement server-side input validation to reject malicious SQL characters in studentId parameter.

🧯 If You Can't Patch

  • Block external access to /academico/aluno/esqueci-minha-senha/ endpoint at network firewall.
  • Implement database user with minimal permissions (read-only if possible) for the application.

🔍 How to Verify

Check if Vulnerable:

Test the endpoint with SQL injection payloads like: /academico/aluno/esqueci-minha-senha/?studentId=1' OR '1'='1

Check Version:

Check application version in admin interface or configuration files (typically 3.1.37 Build 024).

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return appropriate error messages or are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts via password recovery endpoint
  • Requests containing SQL keywords (SELECT, UNION, etc.) in studentId parameter

Network Indicators:

  • HTTP requests to /academico/aluno/esqueci-minha-senha/ with suspicious parameters
  • Unusual database query patterns from application server

SIEM Query:

source="web_logs" AND uri="/academico/aluno/esqueci-minha-senha/" AND (query="*SELECT*" OR query="*UNION*" OR query="*OR*1*1*")

🔗 References

📤 Share & Export