CVE-2023-38190

8.8 HIGH

📋 TL;DR

SuperWebMailer 9.00.0.01710 contains a SQL injection vulnerability in the size parameter during export operations. This allows attackers to execute arbitrary SQL commands on the database. Organizations using this specific version of SuperWebMailer are affected.

💻 Affected Systems

Products:
  • SuperWebMailer
Versions: 9.00.0.01710
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the export functionality via the size parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, or remote code execution if database functions allow it.

🟠

Likely Case

Data exfiltration from the database, potentially including sensitive email data, user credentials, or configuration information.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting unauthorized queries.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with basic web security testing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for updated version

Vendor Advisory: https://herolab.usd.de/security-advisories/usd-2023-0014/

Restart Required: Yes

Instructions:

1. Check vendor website for updated version. 2. Backup current installation. 3. Apply patch or upgrade to fixed version. 4. Restart SuperWebMailer service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize the size parameter before processing.

Implement parameterized queries or input sanitization in export functionality

Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns in the size parameter.

Configure WAF to detect and block SQL injection attempts in POST/GET parameters

🧯 If You Can't Patch

  • Restrict network access to SuperWebMailer to trusted IPs only
  • Implement database user with minimal necessary permissions

🔍 How to Verify

Check if Vulnerable:

Check if SuperWebMailer version is 9.00.0.01710 via admin interface or installation directory.

Check Version:

Check SuperWebMailer admin panel or installation directory for version information

Verify Fix Applied:

Verify version has been updated beyond 9.00.0.01710 and test export functionality with SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple export requests with malformed size parameters
  • Error logs showing SQL syntax errors

Network Indicators:

  • HTTP requests to export endpoints containing SQL keywords in size parameter
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (uri="*export*" AND param="*size=*SELECT*" OR param="*size=*UNION*")

🔗 References

📤 Share & Export