CVE-2023-27254

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform SQL injection attacks on IDAttend's IDWeb application. Attackers can extract or modify all data in the database without needing credentials. Organizations using IDWeb version 3.1.052 or earlier are affected.

💻 Affected Systems

Products:
  • IDAttend IDWeb
Versions: 3.1.052 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is in the GetRoomChanges method.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, data destruction, or full system takeover through privilege escalation.

🟠

Likely Case

Data exfiltration of sensitive information including user credentials, personal data, and system configurations.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF rules, and database permissions restricting damage scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized. The unauthenticated nature makes exploitation trivial for attackers with basic SQLi knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.053 or later

Vendor Advisory: https://www.themissinglink.com.au/security-advisories/cve-2023-27254

Restart Required: Yes

Instructions:

1. Download latest version from IDAttend vendor portal. 2. Backup current installation and database. 3. Install updated version. 4. Restart IDWeb service. 5. Verify functionality.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting GetRoomChanges method

Network Segmentation

all

Restrict access to IDWeb application to authorized internal networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Deploy database monitoring and alerting for suspicious SQL queries

🔍 How to Verify

Check if Vulnerable:

Check IDWeb version in application settings or about page. If version is 3.1.052 or earlier, system is vulnerable.

Check Version:

Check application interface or configuration files for version information

Verify Fix Applied:

Verify version is 3.1.053 or later and test GetRoomChanges functionality with SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by GetRoomChanges requests
  • SQL error messages in application logs

Network Indicators:

  • HTTP requests to GetRoomChanges endpoint with SQL syntax in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (uri="*GetRoomChanges*" AND (param="*' OR *" OR param="*;--*" OR param="*UNION*"))

🔗 References

📤 Share & Export