CVE-2019-25359

8.2 HIGH

📋 TL;DR

This SQL injection vulnerability in SD.NET RIM allows attackers to execute arbitrary SQL commands through POST parameters 'idtyp' and 'idgremium' at the /vorlagen/ endpoint. Attackers can manipulate databases, extract sensitive information, or potentially gain unauthorized access. Organizations using SD.NET RIM versions before 4.7.3c are affected.

💻 Affected Systems

Products:
  • SD.NET RIM
Versions: All versions before 4.7.3c
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation when the /vorlagen/ endpoint is accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover through SQL injection leading to remote code execution.

🟠

Likely Case

Unauthorized data extraction from the database, including sensitive meeting records, user credentials, or organizational information.

🟢

If Mitigated

Limited impact with proper input validation and WAF protection, potentially only causing application errors.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires crafting POST requests with malicious SQL in idtyp and idgremium parameters. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.7.3c

Vendor Advisory: https://www.sitzungsdienst.net/2018/12/sd-net-rim-4-7-3-veroeffentlicht/

Restart Required: Yes

Instructions:

1. Download SD.NET RIM version 4.7.3c or later from the vendor website. 2. Backup current installation and database. 3. Install the updated version following vendor instructions. 4. Restart the application service.

🔧 Temporary Workarounds

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns in POST parameters

Input Validation Filter

all

Implement server-side input validation to sanitize idtyp and idgremium parameters

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for the /vorlagen/ endpoint
  • Restrict network access to the SD.NET RIM application using firewall rules

🔍 How to Verify

Check if Vulnerable:

Test by sending POST requests to /vorlagen/ with SQL injection payloads in idtyp and idgremium parameters

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Verify version is 4.7.3c or later and test that SQL injection attempts no longer succeed

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • POST requests to /vorlagen/ with suspicious parameter values
  • Database error messages containing SQL syntax

Network Indicators:

  • POST requests to /vorlagen/ containing SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/vorlagen/" AND (param="idtyp" OR param="idgremium") AND (value="SELECT" OR value="UNION" OR value="INSERT" OR value="DELETE")

🔗 References

📤 Share & Export