CVE-2023-27260

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform SQL injection attacks against IDAttend's IDWeb application. Attackers can extract or modify all data in the database without needing credentials. Organizations using IDWeb version 3.1.052 or earlier are affected.

💻 Affected Systems

Products:
  • IDAttend IDWeb
Versions: 3.1.052 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the GetAssignmentsDue method and affects all default configurations of the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion of all application data including sensitive user information, potentially leading to full system takeover.

🟠

Likely Case

Data exfiltration of sensitive information such as user credentials, personal data, and attendance records, potentially enabling further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and input validation are in place to block SQL injection attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited and this one requires no authentication, making it highly attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.053 or later

Vendor Advisory: https://www.themissinglink.com.au/security-advisories/cve-2023-27260

Restart Required: Yes

Instructions:

1. Download the latest version from IDAttend vendor
2. Backup current installation and database
3. Install the updated version
4. Restart the application services
5. Verify the update was successful

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting the GetAssignmentsDue endpoint

Network Segmentation

all

Restrict access to the IDWeb application to only authorized internal networks

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in the application code
  • Deploy a web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check the application version in the admin interface or application files. If version is 3.1.052 or earlier, the system is vulnerable.

Check Version:

Check the application's admin panel or version.txt file in the installation directory

Verify Fix Applied:

Verify the application version is 3.1.053 or later and test the GetAssignmentsDue endpoint with SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts followed by SQL error messages
  • Requests to GetAssignmentsDue with SQL syntax in parameters

Network Indicators:

  • Unusual database connection patterns from web server
  • Large data transfers from database to external IPs
  • SQL error messages in HTTP responses

SIEM Query:

source="idweb_logs" AND ("GetAssignmentsDue" AND ("UNION" OR "SELECT" OR "INSERT" OR "UPDATE" OR "DELETE" OR "--" OR "' OR '1'='1"))

🔗 References

📤 Share & Export