CVE-2021-36328
📋 TL;DR
CVE-2021-36328 is a SQL injection vulnerability in Dell EMC Streaming Data Platform that allows remote attackers to execute arbitrary SQL commands. This can lead to unauthorized data access, modification, or deletion from the database. Organizations running affected versions of Dell EMC Streaming Data Platform are vulnerable.
💻 Affected Systems
- Dell EMC Streaming Data Platform
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data exfiltration, data destruction, and potential lateral movement to other systems.
Likely Case
Unauthorized access to sensitive data stored in the database, potentially including credentials, configuration data, and streaming data.
If Mitigated
Limited impact with proper network segmentation and database access controls in place.
🎯 Exploit Status
SQL injection vulnerabilities typically have low exploitation complexity, especially when unauthenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.3 or later
Vendor Advisory: https://www.dell.com/support/kbdoc/en-in/000193697/dsa-2021-205-dell-emc-streaming-data-platform-security-update-for-third-party-vulnerabilities
Restart Required: Yes
Instructions:
1. Backup all data and configurations. 2. Download Dell EMC Streaming Data Platform version 1.3 or later. 3. Follow Dell's upgrade documentation to apply the update. 4. Restart the Streaming Data Platform services.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to the Streaming Data Platform to only trusted sources.
Web Application Firewall
allDeploy a WAF with SQL injection protection rules to block exploitation attempts.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the vulnerable system.
- Monitor database logs for unusual SQL query patterns and implement database-level access restrictions.
🔍 How to Verify
Check if Vulnerable:
Check the installed version of Dell EMC Streaming Data Platform. If version is below 1.3, the system is vulnerable.
Check Version:
Check the platform administration interface or configuration files for version information.
Verify Fix Applied:
Confirm the system is running version 1.3 or later and test SQL injection attempts are properly rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL query patterns in database logs
- Multiple failed authentication attempts followed by SQL errors
- Unexpected database schema changes
Network Indicators:
- HTTP requests containing SQL syntax in parameters
- Unusual database connection patterns from application servers
SIEM Query:
source="database_logs" AND ("sql injection" OR "unexpected query" OR "syntax error")