CVE-2022-1731

9.8 CRITICAL

📋 TL;DR

Metasonic Doc WebClient versions 7.0.14.0, 7.0.12.0, and 7.0.3.0 contain a SQL injection vulnerability in the username field when SSO or System authentication is enabled. This allows authenticated attackers to execute arbitrary SQL commands on the database. Organizations using these vulnerable configurations are affected.

💻 Affected Systems

Products:
  • Metasonic Doc WebClient
Versions: 7.0.14.0, 7.0.12.0, 7.0.3.0
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: SSO or System authentication must be enabled for the vulnerability to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, privilege escalation, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information, and potential lateral movement within the database environment.

🟢

If Mitigated

Limited impact due to proper input validation, parameterized queries, and database permission restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access with SSO or System authentication enabled. SQL injection in username field is typically straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.15.0 or later

Vendor Advisory: https://www.tenable.com/security/research/tra-2022-17

Restart Required: Yes

Instructions:

1. Download and install Metasonic Doc WebClient version 7.0.15.0 or later from the vendor. 2. Restart the WebClient service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable SSO/System Authentication

windows

Temporarily disable Single Sign-On or System authentication to remove the vulnerable condition.

Configure authentication settings in Metasonic Doc WebClient administration panel

Implement WAF Rules

all

Deploy web application firewall rules to block SQL injection patterns in username fields.

Add WAF rule: Detect and block SQL injection patterns in POST parameters

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at the application layer
  • Apply database-level controls: minimal privileges, query logging, and intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check WebClient version in administration panel and verify if SSO or System authentication is enabled.

Check Version:

Check version in Metasonic Doc WebClient administration interface or installation directory properties

Verify Fix Applied:

Confirm installation of version 7.0.15.0 or later and test username field with SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from WebClient application
  • SQL error messages in application logs
  • Multiple failed login attempts with SQL syntax

Network Indicators:

  • POST requests to login endpoints containing SQL keywords in username parameter
  • Unusual database traffic patterns from WebClient server

SIEM Query:

source="webclient_logs" AND (message="*SQL*" OR message="*syntax*" OR message="*injection*")

🔗 References

📤 Share & Export