CVE-2020-26525
📋 TL;DR
CVE-2020-26525 is a SQL injection vulnerability in Damstra Smart Asset 2020.7 that allows attackers to execute arbitrary SQL commands via the API/api/Asset originator parameter. This can lead to data theft, remote code execution, and forced DNS queries to third-party servers. Organizations using Damstra Smart Asset 2020.7 are affected.
💻 Affected Systems
- Damstra Smart Asset
📦 What is this software?
Smart Asset by Damstratechnology
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data exfiltration, remote code execution on the server, and potential lateral movement within the network.
Likely Case
Data theft from the database, potential privilege escalation, and unauthorized access to sensitive asset management information.
If Mitigated
Limited impact with proper input validation, parameterized queries, and network segmentation preventing external connections.
🎯 Exploit Status
Public proof-of-concept code is available, making exploitation straightforward for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later versions after 2020.7
Vendor Advisory: https://support.damstratechnology.com/hc/en-us/categories/900000115446-SmartAsset-Damstra-Asset-Management-Platform
Restart Required: Yes
Instructions:
1. Upgrade to the latest version of Damstra Smart Asset. 2. Apply any security patches provided by the vendor. 3. Restart the application services.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation and parameterized queries for the API endpoint.
Network Segmentation
allRestrict outbound DNS queries from the application server to prevent forced connections to third-party DNS servers.
🧯 If You Can't Patch
- Implement a web application firewall (WAF) with SQL injection rules.
- Restrict network access to the API endpoint using firewall rules.
🔍 How to Verify
Check if Vulnerable:
Check if the application is running Damstra Smart Asset version 2020.7 and test the API endpoint for SQL injection vulnerabilities.
Check Version:
Check the application's version through its admin interface or configuration files.
Verify Fix Applied:
Verify the application version has been updated and test the API endpoint to ensure SQL injection is no longer possible.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in application logs
- Multiple failed login attempts or SQL errors
Network Indicators:
- Unexpected outbound DNS queries from the application server
- Unusual API traffic patterns
SIEM Query:
Example: search for 'SQL' AND 'error' in application logs from the Smart Asset server.
🔗 References
- https://github.com/lukaszstu/SmartAsset-SQLinj-CVE-2020-26525/blob/main/README.md
- https://support.damstratechnology.com/hc/en-us/categories/900000115446-SmartAsset-Damstra-Asset-Management-Platform
- https://www.smartasset.com.au/
- https://github.com/lukaszstu/SmartAsset-SQLinj-CVE-2020-26525/blob/main/README.md
- https://support.damstratechnology.com/hc/en-us/categories/900000115446-SmartAsset-Damstra-Asset-Management-Platform
- https://www.smartasset.com.au/