CVE-2023-1765

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Akbim Computer Panon allows attackers to execute arbitrary SQL commands on the database. It affects all Panon installations before version 1.0.2, potentially compromising data confidentiality, integrity, and availability.

💻 Affected Systems

Products:
  • Akbim Computer Panon
Versions: All versions before 1.0.2
Operating Systems: Not specified - likely cross-platform
Default Config Vulnerable: ⚠️ Yes
Notes: All installations running vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized data access, data manipulation, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permissions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with basic web security testing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.2

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0193

Restart Required: Yes

Instructions:

1. Download Panon version 1.0.2 or later from the vendor. 2. Backup current installation and database. 3. Stop the Panon service. 4. Install the updated version. 5. Restart the Panon service. 6. Verify functionality.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious requests.

Database Permissions Restriction

all

Limit database user permissions to only necessary operations (SELECT, INSERT, etc.) and remove administrative privileges.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in application code
  • Isolate the vulnerable system behind a firewall with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check Panon version in administration interface or configuration files. If version is below 1.0.2, the system is vulnerable.

Check Version:

Check application configuration or admin panel for version information

Verify Fix Applied:

Confirm Panon version is 1.0.2 or higher and test SQL injection payloads return error messages rather than executing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL-like syntax
  • Unexpected database queries

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, DROP, etc.)
  • Unusual database connection patterns

SIEM Query:

source="panon_logs" AND ("sql" OR "syntax" OR "union" OR "select" OR "drop")

🔗 References

📤 Share & Export