CVE-2020-13877

9.8 CRITICAL

📋 TL;DR

This CVE describes SQL injection vulnerabilities in ResourceXpress Meeting Monitor 4.9 ASPX pages that allow attackers to execute arbitrary SQL commands. Successful exploitation could lead to remote code execution and sensitive data disclosure. Organizations using ResourceXpress Meeting Monitor 4.9 are affected.

💻 Affected Systems

Products:
  • ResourceXpress Meeting Monitor
Versions: Version 4.9
Operating Systems: Windows (ASPX typically runs on IIS/Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: Specific ASPX pages within the Meeting Monitor application are vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution leading to data theft, lateral movement, and persistent backdoor installation

🟠

Likely Case

Database compromise with sensitive meeting data, user credentials, and organizational information disclosure

🟢

If Mitigated

Limited impact with proper input validation, WAF protection, and network segmentation

🌐 Internet-Facing: HIGH - ASPX pages are typically web-accessible and SQL injection can be exploited remotely
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or unauthenticated attacks

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are well-understood attack vectors with many available tools

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.8 HF 1,2,3 OnPrem v5.3 or later

Vendor Advisory: https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/807698439/v1.8+HF+1+2+3+OnPrem+v5.3

Restart Required: Yes

Instructions:

1. Download the latest patch from ResourceXpress vendor portal. 2. Backup current installation. 3. Apply the patch following vendor instructions. 4. Restart the application and IIS services. 5. Verify functionality.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block malicious requests

Input Validation Filter

windows

Implement application-level input validation for all ASPX parameters

🧯 If You Can't Patch

  • Isolate the Meeting Monitor system in a separate network segment with strict firewall rules
  • Implement strong authentication and limit access to only authorized users

🔍 How to Verify

Check if Vulnerable:

Review application version in admin interface or check installed files for version 4.9

Check Version:

Check application web interface or review installation directory version files

Verify Fix Applied:

Confirm version is updated to v1.8 HF 1,2,3 OnPrem v5.3 or later and test SQL injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in IIS logs
  • Multiple failed login attempts with SQL syntax
  • Long parameter values in URL requests

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, INSERT, etc.)
  • Unusual database connection patterns

SIEM Query:

source="IIS" AND ("sql" OR "union" OR "select" OR "insert" OR "delete") AND status=500

🔗 References

📤 Share & Export