CVE-2023-1198

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Saysis Starcities allows attackers to execute arbitrary SQL commands through the application. It affects all Starcities installations running version 1.3 or earlier, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • Saysis Starcities
Versions: through 1.3
Operating Systems: All platforms running Starcities
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, deletion, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information, and potential privilege escalation within the database.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing successful injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0140

Restart Required: No

Instructions:

1. Check vendor advisory for patch availability. 2. If patch exists, download and apply following vendor instructions. 3. Update to version after 1.3 when available.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side input validation to sanitize user inputs before processing SQL queries.

Use Parameterized Queries

all

Replace dynamic SQL queries with parameterized/prepared statements throughout the application.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection rules
  • Restrict database user permissions to minimum required

🔍 How to Verify

Check if Vulnerable:

Check Starcities version number in application interface or configuration files.

Check Version:

Check application admin panel or configuration files for version information.

Verify Fix Applied:

Verify version is above 1.3 and test SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL syntax

Network Indicators:

  • HTTP requests containing SQL keywords in parameters
  • Unusual database query patterns

SIEM Query:

source="web_logs" AND ("SELECT" OR "UNION" OR "INSERT" OR "DELETE") AND status="200"

🔗 References

📤 Share & Export