CVE-2018-18822

9.8 CRITICAL

📋 TL;DR

CVE-2018-18822 is a SQL injection vulnerability in Grapixel New Media v2.0 that allows attackers to execute arbitrary SQL commands via the pages.aspx pageref parameter. This affects all systems running the vulnerable version of Grapixel New Media. Successful exploitation could lead to complete database compromise.

💻 Affected Systems

Products:
  • Grapixel New Media
Versions: v2.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web application component specifically the pages.aspx endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Database information disclosure, data manipulation, and potential authentication bypass.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place.

🌐 Internet-Facing: HIGH - Directly accessible web parameter with SQL injection allows remote exploitation.
🏢 Internal Only: MEDIUM - Still vulnerable but requires internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Exploit-DB demonstrates simple SQL injection payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Implement input validation and parameterized queries in the application code.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns in the pageref parameter.

Input Validation Filter

all

Implement server-side validation to restrict pageref parameter to expected values.

🧯 If You Can't Patch

  • Isolate the vulnerable system behind a reverse proxy with strict input filtering.
  • Implement network segmentation to limit access to the vulnerable application.

🔍 How to Verify

Check if Vulnerable:

Test the pages.aspx endpoint with SQL injection payloads like ' OR '1'='1 in the pageref parameter.

Check Version:

Check application version in admin panel or configuration files.

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return error messages or are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple requests with SQL keywords in pageref parameter

Network Indicators:

  • HTTP requests containing SQL injection patterns in URL parameters

SIEM Query:

source="web_logs" AND (pageref="*' OR*" OR pageref="*;--*" OR pageref="*UNION*" OR pageref="*SELECT*" OR pageref="*INSERT*")

🔗 References

📤 Share & Export