CVE-2020-25253

9.8 CRITICAL

📋 TL;DR

This CVE allows SQL injection attacks in Hyland OnBase through multiple parameters (TableName, ColumnName, Name, UserId, Password). Attackers can execute arbitrary SQL commands, potentially compromising database integrity and confidentiality. Affects OnBase versions 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below, and 20.3.10.1000 and below.

💻 Affected Systems

Products:
  • Hyland OnBase
Versions: 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below, 20.3.10.1000 and below
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability exists in multiple parameters across the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, deletion, and potential remote code execution via database functions.

🟠

Likely Case

Data exfiltration, privilege escalation, and unauthorized access to sensitive information stored in the database.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection is well-understood with many automated tools available. The vulnerability affects multiple parameters, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above those listed in affected versions

Vendor Advisory: https://www.hyland.com/en/security-advisories

Restart Required: Yes

Instructions:

1. Contact Hyland support for specific patch versions. 2. Apply the security update provided by Hyland. 3. Restart OnBase services. 4. Test application functionality.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns in the vulnerable parameters

Input Validation

all

Implement strict input validation for TableName, ColumnName, Name, UserId, and Password parameters

🧯 If You Can't Patch

  • Implement network segmentation to isolate OnBase servers from untrusted networks
  • Deploy database activity monitoring to detect SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Test parameters with SQL injection payloads (e.g., ' OR '1'='1) in TableName, ColumnName, Name, UserId, or Password fields

Check Version:

Check OnBase version in administration console or via Hyland documentation

Verify Fix Applied:

Verify version is above affected ranges and test SQL injection attempts are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts with SQL patterns
  • Long parameter values in web server logs

Network Indicators:

  • SQL keywords in HTTP parameters
  • Unusual database connection patterns from application servers

SIEM Query:

source="web_logs" AND (param="*SELECT*" OR param="*UNION*" OR param="*OR*1=1*")

🔗 References

📤 Share & Export