CVE-2019-25440

8.2 HIGH

📋 TL;DR

This SQL injection vulnerability in WebIncorp ERP allows unauthenticated attackers to manipulate database queries through the prod_id parameter in product_detail.php. Attackers can extract sensitive database information including user credentials, financial data, and system configurations. All organizations using WebIncorp ERP are affected.

💻 Affected Systems

Products:
  • WebIncorp ERP
Versions: All versions
Operating Systems: All platforms running WebIncorp ERP
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, authentication bypass, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Extraction of sensitive business data including customer information, financial records, and user credentials, potentially leading to data breaches and compliance violations.

🟢

If Mitigated

Limited information disclosure if proper input validation and parameterized queries are implemented, with minimal impact on system availability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute. The vulnerability can be exploited with simple HTTP GET requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch is available. Implement input validation and parameterized queries in product_detail.php to sanitize the prod_id parameter.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns in the prod_id parameter

Input Validation Filter

all

Add input validation to only accept numeric values for prod_id parameter

Modify product_detail.php to include: if(!is_numeric($_GET['prod_id'])) { die('Invalid input'); }

🧯 If You Can't Patch

  • Block external access to product_detail.php via network firewall rules
  • Implement database-level restrictions to limit query capabilities of the application user

🔍 How to Verify

Check if Vulnerable:

Send GET request to product_detail.php with prod_id parameter containing SQL injection payload like: product_detail.php?prod_id=1' OR '1'='1

Check Version:

Check WebIncorp ERP version in admin panel or configuration files

Verify Fix Applied:

Test with SQL injection payloads and verify they are rejected or sanitized without returning database errors

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SQL queries in database logs
  • Unusual parameter values in web server access logs for product_detail.php
  • Database error messages containing SQL syntax

Network Indicators:

  • HTTP GET requests to product_detail.php with suspicious prod_id parameters
  • Unusual database query patterns from web server IP

SIEM Query:

source="web_server_logs" AND uri="*product_detail.php*" AND (param="*prod_id=*'*" OR param="*prod_id=*%27*")

🔗 References

📤 Share & Export