CVE-2022-48594

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in ScienceLogic SL1's ticket watchers email feature allows attackers to execute arbitrary SQL commands by injecting malicious input. Attackers could potentially read, modify, or delete database contents, affecting all ScienceLogic SL1 users with vulnerable versions.

💻 Affected Systems

Products:
  • ScienceLogic SL1
Versions: Versions prior to 11.3.2
Operating Systems: All platforms running SL1
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the ticket watchers email feature specifically; requires access to the SL1 web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining.

🟠

Likely Case

Unauthorized data access, privilege escalation, or data manipulation in the SL1 database.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage scope.

🌐 Internet-Facing: HIGH if SL1 web interface is exposed to internet, as SQL injection can be exploited remotely.
🏢 Internal Only: HIGH as authenticated users or attackers who gain internal access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authentication to access the vulnerable feature; SQL injection is a well-understood attack vector with many available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.3.2 and later

Vendor Advisory: https://www.sciencelogic.com/

Restart Required: Yes

Instructions:

1. Backup your SL1 database and configuration. 2. Download and install SL1 version 11.3.2 or later from ScienceLogic support portal. 3. Follow ScienceLogic's upgrade documentation for your specific deployment. 4. Restart SL1 services after upgrade completion.

🔧 Temporary Workarounds

Disable ticket watchers email feature

all

Temporarily disable the vulnerable feature until patching is possible

Implement WAF rules

all

Deploy web application firewall rules to block SQL injection patterns

🧯 If You Can't Patch

  • Restrict network access to SL1 web interface to trusted IPs only
  • Implement strict database permissions and monitor for unusual SQL queries

🔍 How to Verify

Check if Vulnerable:

Check SL1 version via web interface admin panel or command line: sl1 --version

Check Version:

sl1 --version

Verify Fix Applied:

Confirm version is 11.3.2 or later and test ticket watchers email feature with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by ticket watchers feature access
  • SQL syntax errors in application logs

Network Indicators:

  • HTTP POST requests to ticket watchers endpoint containing SQL keywords
  • Unusual database connection patterns

SIEM Query:

source="sl1_logs" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "DROP") AND "ticket_watchers"

🔗 References

📤 Share & Export