CVE-2022-27434
📋 TL;DR
CVE-2022-27434 is a SQL injection vulnerability in UNIT4 TETA Mobile Edition that allows attackers to execute arbitrary SQL commands via the ProfileName parameter. This affects all TETA ME installations before version 29.5.HF17, potentially compromising database integrity and confidentiality.
💻 Affected Systems
- UNIT4 TETA Mobile Edition
📦 What is this software?
Teta by Unit4
⚠️ Risk & Real-World Impact
Worst Case
Full database compromise including data theft, data manipulation, and potential remote code execution on the database server.
Likely Case
Unauthorized data access, extraction of sensitive information, and potential privilege escalation within the database.
If Mitigated
Limited impact with proper input validation and database permission restrictions in place.
🎯 Exploit Status
SQL injection vulnerabilities are commonly weaponized and public proof-of-concept code exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 29.5.HF17 and later
Vendor Advisory: https://teta.unit4.com/pl
Restart Required: Yes
Instructions:
1. Download the latest patch from UNIT4 TETA vendor portal. 2. Apply the patch following vendor instructions. 3. Restart the TETA Mobile Edition service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize the ProfileName parameter
Not applicable - requires code changes
WAF Rule
allDeploy web application firewall rules to block SQL injection patterns
Not applicable - WAF configuration required
🧯 If You Can't Patch
- Restrict network access to the TETA ME interface using firewall rules
- Implement database user privilege restrictions to limit potential damage
🔍 How to Verify
Check if Vulnerable:
Check if version is below 29.5.HF17 in TETA ME administration interface
Check Version:
Check TETA ME web interface or configuration files for version information
Verify Fix Applied:
Confirm version is 29.5.HF17 or higher and test the errorReporting page with SQL injection test payloads
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple requests to errorReporting page with suspicious ProfileName values
Network Indicators:
- HTTP POST requests to errorReporting page containing SQL keywords in parameters
SIEM Query:
source="web_server" AND uri="/errorReporting" AND (param="ProfileName" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "INSERT")