CVE-2018-25187

8.2 HIGH

📋 TL;DR

CVE-2018-25187 allows unauthenticated attackers to directly download the kim.db database file containing user credentials and password hashes, and execute SQL injection attacks through the menu endpoint. This affects Tina4 Stack version 1.0.3 deployments, potentially exposing all user data and allowing database manipulation.

💻 Affected Systems

Products:
  • Tina4 Stack
Versions: 1.0.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of Tina4 Stack 1.0.3 are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including credential theft, data exfiltration, and potential remote code execution via SQL injection.

🟠

Likely Case

Unauthenticated attackers steal user credentials and password hashes, then use them for further attacks or data manipulation.

🟢

If Mitigated

Limited impact if database contains no sensitive data or is properly segmented from production systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4 or later

Vendor Advisory: https://github.com/andrevmartins/Tina4Stack

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Upgrade to Tina4 Stack version 1.0.4 or later. 3. Restart the Tina4 Stack service. 4. Verify the fix by testing database file access and SQL injection vectors.

🔧 Temporary Workarounds

Database File Access Restriction

all

Block direct access to kim.db file via web server configuration.

For Apache: <Files "kim.db">
  Require all denied
</Files>
For Nginx: location ~ \.db$ {
  deny all;
}

Input Validation for Menu Endpoint

all

Implement parameter validation and SQL injection filtering for menu endpoint.

Implement prepared statements and parameterized queries in menu endpoint code.

🧯 If You Can't Patch

  • Isolate Tina4 Stack deployment behind a WAF with SQL injection protection rules.
  • Implement network segmentation to restrict access to only trusted users and systems.

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[target]/kim.db directly. If database downloads, system is vulnerable. Test SQL injection via menu endpoint parameters.

Check Version:

Check Tina4 Stack version in configuration files or via application interface.

Verify Fix Applied:

Verify kim.db file cannot be accessed directly and SQL injection attempts via menu endpoint are blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests for kim.db file
  • Unusual SQL queries in application logs
  • Multiple failed login attempts following database access

Network Indicators:

  • Unusual outbound database connections
  • Large data transfers from kim.db file downloads

SIEM Query:

source="web_logs" AND (uri="/kim.db" OR uri LIKE "%/menu?%" AND (param CONTAINS "' OR" OR param CONTAINS "--"))

🔗 References

📤 Share & Export