CVE-2023-26572

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform SQL injection attacks against IDAttend's IDWeb application. Attackers can extract or modify all data in the database without needing credentials. Organizations using IDWeb version 3.1.052 or earlier are affected.

💻 Affected Systems

Products:
  • IDAttend IDWeb
Versions: 3.1.052 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the GetExcursionList method and affects all installations with default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive attendee data, authentication credentials, and system configuration. Attackers could modify or delete all data, potentially rendering the system unusable.

🟠

Likely Case

Data exfiltration of sensitive attendee information, potentially including personal identifiable information (PII). Attackers may also gain administrative access to the system.

🟢

If Mitigated

Limited to attempted attacks that are blocked by network controls or WAF rules, with no actual data compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited and this one requires no authentication, making it particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.053 or later

Vendor Advisory: https://www.themissinglink.com.au/security-advisories/cve-2023-26572

Restart Required: Yes

Instructions:

1. Download the latest version from IDAttend vendor portal. 2. Backup current installation and database. 3. Install the update following vendor instructions. 4. Restart the IDWeb service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block exploitation attempts

Network Segmentation

all

Restrict access to IDWeb application to only authorized internal networks

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in the application code
  • Deploy network-level controls to restrict access to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check the application version in the admin interface or configuration files. If version is 3.1.052 or earlier, the system is vulnerable.

Check Version:

Check the application's admin panel or configuration files for version information

Verify Fix Applied:

Verify the application version shows 3.1.053 or later. Test the GetExcursionList endpoint with SQL injection payloads to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts followed by SQL errors
  • Requests to GetExcursionList with SQL keywords

Network Indicators:

  • Unusual database connection patterns
  • SQL error messages in HTTP responses
  • Requests containing SQL injection payloads

SIEM Query:

source="idweb.log" AND ("GetExcursionList" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "--" OR "' OR '1'='1"))

🔗 References

📤 Share & Export