CVE-2019-19249

9.8 CRITICAL

📋 TL;DR

CVE-2019-19249 is an improper input validation vulnerability in QueryTree's invitation handling that allows attackers to execute arbitrary code. This affects all QueryTree instances before version 3.0.99-beta that have the invitation feature enabled. Attackers can exploit this to gain full control of the application server.

💻 Affected Systems

Products:
  • QueryTree
Versions: All versions before 3.0.99-beta
Operating Systems: All platforms running QueryTree
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the invitation feature; disabling invitations may reduce attack surface but doesn't fully mitigate.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to the QueryTree database, privilege escalation, and potential data manipulation or theft.

🟢

If Mitigated

Limited impact with proper network segmentation and application firewalls blocking exploitation attempts.

🌐 Internet-Facing: HIGH - Exploitable remotely without authentication, CVSS 9.8 indicates critical severity for internet-facing instances.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to authenticated or network-adjacent attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CVSS 9.8 and CWE-20 (Improper Input Validation), exploitation is likely straightforward for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.99-beta and later

Vendor Advisory: https://github.com/d4software/QueryTree/commit/57b700823f8eb1a42eb3bc0c706fbe5e5f5e766f

Restart Required: Yes

Instructions:

1. Backup your QueryTree database and configuration. 2. Download QueryTree 3.0.99-beta or later from GitHub. 3. Replace existing installation with patched version. 4. Restart the QueryTree service. 5. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Disable Invitation Feature

all

Temporarily disable the invitation functionality to reduce attack surface.

Modify QueryTree configuration to disable user invitations

Network Access Control

linux

Restrict access to QueryTree to trusted IP addresses only.

iptables -A INPUT -p tcp --dport [QueryTree_port] -s [trusted_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [QueryTree_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate QueryTree from critical systems
  • Deploy a web application firewall (WAF) with rules to block suspicious invitation requests

🔍 How to Verify

Check if Vulnerable:

Check QueryTree version via web interface or configuration files. If version is below 3.0.99-beta, system is vulnerable.

Check Version:

Check the version displayed in QueryTree web interface or examine package/installation metadata

Verify Fix Applied:

After patching, verify version is 3.0.99-beta or higher and test invitation functionality works correctly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual invitation creation requests
  • Multiple failed invitation attempts
  • Requests with malformed parameters to invitation endpoints

Network Indicators:

  • HTTP POST requests to /invitations endpoint with suspicious payloads
  • Unusual outbound connections from QueryTree server

SIEM Query:

source="QueryTree" AND (uri_path="/invitations" OR event="invitation_created") AND status=200

🔗 References

📤 Share & Export