CVE-2019-16264

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform SQL injection through the username parameter in the authentication form of EGPP GESAC v1. This enables unauthorized database access, potentially exposing sensitive academic and personal information. All systems running EGPP GESAC v1 are affected.

💻 Affected Systems

Products:
  • Escuela de Gestion Publica Plurinacional (EGPP) Sistema Integrado de Gestion Academica (GESAC)
Versions: Version 1
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of GESAC v1 are vulnerable by default as this is a code-level vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, privilege escalation, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized access to sensitive student and academic records, potential authentication bypass, and data exfiltration.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH - Authentication forms are typically internet-facing, making exploitation trivial for remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection on authentication forms is easily weaponized with automated tools like sqlmap.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Contact EGPP for updated version or patch
2. If unavailable, implement workarounds immediately
3. Consider migrating to alternative software

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block malicious payloads

Input Validation Filter

all

Implement server-side input validation to reject SQL special characters in username field

🧯 If You Can't Patch

  • Isolate the GESAC system from internet access using network segmentation
  • Implement strict access controls and monitor all authentication attempts

🔍 How to Verify

Check if Vulnerable:

Test username parameter with SQL injection payloads like ' OR '1'='1

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Attempt SQL injection tests and verify they are rejected or properly escaped

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts with SQL syntax in username field
  • Unusual database queries from web application user

Network Indicators:

  • HTTP POST requests to login endpoint containing SQL keywords
  • Unusual database traffic patterns

SIEM Query:

source="web_logs" AND (username="*' OR*" OR username="*;--*" OR username="*UNION*" OR username="*SELECT*" OR username="*INSERT*" OR username="*UPDATE*" OR username="*DELETE*")

🔗 References

📤 Share & Export