CVE-2023-2907

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Marksoft allows attackers to execute arbitrary SQL commands through the Mobile, Login, and API components. Successful exploitation could lead to data theft, authentication bypass, or complete system compromise. All users running affected versions of Marksoft are vulnerable.

💻 Affected Systems

Products:
  • Marksoft Mobile
  • Marksoft Login
  • Marksoft API
Versions: Mobile: through v.7.1.7; Login: through 1.4; API: through 20230605
Operating Systems: All platforms running Marksoft
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, authentication bypass, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized data access, authentication bypass, and potential data manipulation or deletion in the Marksoft database.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation preventing database access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity and can be exploited without authentication if the vulnerable endpoint is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0363

Restart Required: No

Instructions:

1. Monitor vendor for security updates. 2. Apply patches immediately when available. 3. Test patches in non-production environment first.

🔧 Temporary Workarounds

Implement Web Application Firewall

all

Deploy WAF with SQL injection rules to block malicious requests

Network Segmentation

all

Restrict database access to only necessary application servers

🧯 If You Can't Patch

  • Implement input validation and parameterized queries in application code
  • Disable or restrict access to vulnerable endpoints if not required

🔍 How to Verify

Check if Vulnerable:

Check Marksoft version numbers against affected versions. Test endpoints with SQL injection payloads in controlled environment.

Check Version:

Check Marksoft administration interface or configuration files for version information

Verify Fix Applied:

Verify updated version numbers and test with SQL injection payloads to confirm remediation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL syntax
  • Database connection errors

Network Indicators:

  • SQL keywords in HTTP requests (SELECT, UNION, etc.)
  • Unusual database query patterns
  • High volume of requests to login/API endpoints

SIEM Query:

source="marksoft.logs" AND ("SQL syntax" OR "database error" OR "unexpected token")

🔗 References

📤 Share & Export