CVE-2022-1531

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical SQL injection vulnerability in the ARAX-UI Synonym Lookup functionality of the rtx software. Attackers can exploit this to execute arbitrary SQL commands, potentially leading to remote code execution and complete server compromise. All users running rtx versions prior to checkpoint_2022-04-20 are affected.

💻 Affected Systems

Products:
  • rtx/ARAX-UI
Versions: All versions prior to checkpoint_2022-04-20
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the Synonym Lookup functionality specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with administrative access, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Database compromise leading to data theft, manipulation, or deletion, potentially escalating to RCE.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with readily available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: checkpoint_2022-04-20 or later

Vendor Advisory: https://github.com/rtxteam/rtx/commit/fa2797e656e3dba18f990a2db1f0f029d41f1921

Restart Required: Yes

Instructions:

1. Update to checkpoint_2022-04-20 or later via git pull. 2. Restart the rtx service. 3. Verify the fix by checking the commit hash includes fa2797e656e3dba18f990a2db1f0f029d41f1921.

🔧 Temporary Workarounds

Disable Synonym Lookup

all

Temporarily disable the vulnerable functionality to prevent exploitation.

Modify configuration to disable Synonym Lookup endpoint

WAF Rule

all

Implement Web Application Firewall rules to block SQL injection patterns.

Configure WAF to detect and block SQL injection attempts

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all user inputs.
  • Isolate the rtx instance behind a firewall and restrict network access.

🔍 How to Verify

Check if Vulnerable:

Check if your rtx version is older than checkpoint_2022-04-20 by examining the git commit history or version tag.

Check Version:

git log --oneline -1

Verify Fix Applied:

Confirm the commit fa2797e656e3dba18f990a2db1f0f029d41f1921 is present in your codebase.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts or SQL errors

Network Indicators:

  • Unexpected database connections from the application server
  • SQL injection patterns in HTTP requests

SIEM Query:

source="application.log" AND ("SQL" OR "injection" OR "synonym")

🔗 References

📤 Share & Export