CVE-2022-46763

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in TrueConf Server allows low-privileged database users to execute arbitrary SQL commands with database administrator privileges. This can lead to arbitrary code execution on the server. Affects TrueConf Server version 5.2.0.10225 and potentially earlier versions.

💻 Affected Systems

Products:
  • TrueConf Server
Versions: 5.2.0.10225 and earlier (fixed in 5.2.6)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged database user access to exploit. The vulnerability is in a database stored function.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the TrueConf Server with full administrative control, data exfiltration, and potential lateral movement to other systems.

🟠

Likely Case

Database compromise leading to data theft, privilege escalation, and potential RCE on the server.

🟢

If Mitigated

Limited impact if proper network segmentation and database user privilege restrictions are in place.

🌐 Internet-Facing: HIGH if TrueConf Server is exposed to the internet, as SQL injection can be exploited remotely.
🏢 Internal Only: MEDIUM for internal deployments, requiring authenticated database access but still significant risk.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires database user credentials but SQL injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.6

Vendor Advisory: https://solidlab.ru/our-news/145-trueconf.html

Restart Required: Yes

Instructions:

1. Download TrueConf Server version 5.2.6 or later from the official vendor website. 2. Backup your current configuration and database. 3. Install the updated version following vendor instructions. 4. Restart the TrueConf Server service.

🔧 Temporary Workarounds

Restrict Database User Privileges

all

Limit database user permissions to prevent execution of arbitrary SQL commands.

REVOKE EXECUTE ON [vulnerable_function] FROM [low_privilege_user];
ALTER USER [low_privilege_user] WITH NOSUPERUSER;

Network Segmentation

linux

Isolate TrueConf Server database from untrusted networks.

iptables -A INPUT -p tcp --dport 5432 -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport 5432 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit database connections to trusted hosts only.
  • Monitor database logs for unusual SQL query patterns and implement database activity monitoring.

🔍 How to Verify

Check if Vulnerable:

Check TrueConf Server version via web interface or configuration files. If version is 5.2.0.10225 or earlier, system is vulnerable.

Check Version:

On Linux: cat /opt/trueconf/version.txt or check web interface. On Windows: Check program files directory or registry.

Verify Fix Applied:

Verify version is 5.2.6 or later and test database user permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries from low-privileged users
  • Database privilege escalation attempts
  • Execution of administrative SQL commands

Network Indicators:

  • Unusual database connection patterns
  • SQL injection payloads in database traffic

SIEM Query:

source="database_logs" AND ("GRANT" OR "ALTER USER" OR "EXECUTE" OR suspicious_sql_patterns)

🔗 References

📤 Share & Export