CVE-2023-29863

9.8 CRITICAL

📋 TL;DR

Medical Systems Co. Medisys Weblab Products v19.4.03 contains a SQL injection vulnerability in the WSDL files via the tem:statement parameter. This allows attackers to execute arbitrary SQL commands on the database. All systems running the vulnerable version are affected.

💻 Affected Systems

Products:
  • Medical Systems Co. Medisys Weblab Products
Versions: v19.4.03
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in WSDL files which are typically exposed as part of web service endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, authentication bypass, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized data access, extraction of sensitive medical information, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via WSDL parameter is well-documented and easy to exploit with standard SQLi tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://medical.com

Restart Required: No

Instructions:

1. Contact Medical Systems Co. for patch availability
2. If patch exists, download from vendor portal
3. Apply patch following vendor instructions
4. Test application functionality

🔧 Temporary Workarounds

WSDL Input Validation

all

Implement strict input validation for tem:statement parameter in WSDL endpoints

Not applicable - requires code changes

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns in WSDL requests

WAF-specific configuration required

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Weblab services
  • Deploy database monitoring to detect SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Test WSDL endpoints with SQL injection payloads in tem:statement parameter

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Retest with SQL injection payloads after remediation to confirm no database errors or unexpected responses

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in application logs
  • Unusual database query patterns
  • Multiple failed WSDL requests

Network Indicators:

  • SQL keywords in HTTP POST parameters
  • Unusual traffic to WSDL endpoints
  • Database error messages in HTTP responses

SIEM Query:

source="weblab_logs" AND ("SQL" OR "syntax" OR "tem:statement")

🔗 References

📤 Share & Export