CVE-2019-13027

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary SQL commands through the taskupdt/taskdetails.aspx webpage in Realization Concerto Critical Chain Planner 5.10.8071 via the projectname parameter. This affects organizations using this specific version of the CCPM software for project management. Successful exploitation could lead to complete database compromise.

💻 Affected Systems

Products:
  • Realization Concerto Critical Chain Planner (CCPM)
Versions: 5.10.8071
Operating Systems: Windows (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web interface component of the CCPM software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized data access, data exfiltration, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation and database permission restrictions in place.

🌐 Internet-Facing: HIGH if the application is exposed to the internet without proper web application firewall protection.
🏢 Internal Only: HIGH as authenticated users or attackers who gain internal network access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the web interface, but SQL injection payloads are well-documented and easy to craft.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Contact Realization for patch availability. If no patch exists, upgrade to a newer version if available.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize the projectname parameter

Implement parameterized queries or stored procedures
Add input validation to reject SQL special characters

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

Configure WAF to block SQL injection patterns
Enable input validation rules for projectname parameter

🧯 If You Can't Patch

  • Isolate the CCPM application behind a reverse proxy with strict input validation
  • Implement network segmentation to limit access to the CCPM server

🔍 How to Verify

Check if Vulnerable:

Test the taskupdt/taskdetails.aspx endpoint with SQL injection payloads in the projectname parameter

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return error messages

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts followed by SQL injection patterns
  • Unusual database queries from application user

Network Indicators:

  • HTTP requests containing SQL keywords in projectname parameter
  • Unusual database connection patterns from application server

SIEM Query:

source="web_logs" AND (uri="*taskdetails.aspx*" AND (param="*projectname*" AND value="*SELECT*" OR value="*UNION*" OR value="*OR 1=1*"))

🔗 References

📤 Share & Export