CVE-2021-22508

7.2 HIGH

📋 TL;DR

CVE-2021-22508 is an SQL injection vulnerability in OpenText Operations Bridge Reporter that allows authenticated administrators to execute arbitrary SQL queries. This affects organizations using vulnerable versions of OBR with administrator accounts that could be compromised or misused.

💻 Affected Systems

Products:
  • OpenText Operations Bridge Reporter
Versions: All versions prior to 10.71
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to the OBR web application interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, or deletion of critical monitoring data, potentially leading to loss of operational visibility.

🟠

Likely Case

Unauthorized data access or modification of OBR reporting data, potentially affecting compliance and operational monitoring.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring of administrator activities.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials but SQL injection techniques are well-documented and easily weaponized once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 10.71 or later

Vendor Advisory: https://support.microfocus.com/kb/kmdoc.php?id=KM03793174

Restart Required: Yes

Instructions:

1. Download OBR version 10.71 or later from Micro Focus support portal. 2. Backup current OBR configuration and database. 3. Install the updated version following vendor documentation. 4. Restart OBR services. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit administrator accounts to only essential personnel and implement strong authentication controls.

Network Segmentation

all

Place OBR behind internal firewalls and restrict access to only necessary network segments.

🧯 If You Can't Patch

  • Implement strict monitoring of administrator account activities and database queries
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check OBR version via web interface or installation directory. Versions below 10.71 are vulnerable.

Check Version:

Check OBR web interface login page or consult installation documentation for version verification.

Verify Fix Applied:

Verify OBR version is 10.71 or higher and test SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in OBR logs
  • Multiple failed login attempts followed by successful administrator login
  • Unexpected database schema changes

Network Indicators:

  • Unusual database connection patterns from OBR server
  • SQL error messages in HTTP responses

SIEM Query:

source="OBR" AND ("sql" OR "query" OR "database") AND ("error" OR "exception" OR "malformed")

🔗 References

📤 Share & Export