CVE-2023-50589

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Grupo Embras GEOSIAP ERP allows attackers to execute arbitrary SQL commands via the codLogin parameter on the login page. Attackers can potentially bypass authentication, access sensitive data, or compromise the database server. All users running the affected version are at risk.

💻 Affected Systems

Products:
  • Grupo Embras GEOSIAP ERP
Versions: v2.2.167.02
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default login functionality and does not require special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, remote code execution on the database server, and potential lateral movement to other systems.

🟠

Likely Case

Authentication bypass allowing unauthorized access to the ERP system, followed by data exfiltration and privilege escalation within the application.

🟢

If Mitigated

Failed login attempts logged, no data access or system compromise if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH - Login pages are typically internet-facing, making this vulnerability easily accessible to remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the ERP system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection on login pages is a common attack vector with readily available tools and techniques. The public proof-of-concept demonstrates exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Contact Grupo Embras for patch availability. 2. If patch exists, download and apply according to vendor instructions. 3. Test the fix in a non-production environment first.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns in the codLogin parameter

Input Validation Filter

all

Add server-side input validation to reject suspicious characters in login fields

🧯 If You Can't Patch

  • Implement a reverse proxy with strict input validation for the login endpoint
  • Isolate the ERP system in a segmented network with strict access controls

🔍 How to Verify

Check if Vulnerable:

Test the login page with SQL injection payloads in the codLogin parameter (e.g., ' OR '1'='1) and observe if authentication is bypassed or error messages reveal SQL details.

Check Version:

Check application version in the interface or configuration files; specific command depends on deployment method.

Verify Fix Applied:

Attempt the same SQL injection tests after remediation; successful login should only occur with valid credentials, and no SQL errors should be displayed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL-like patterns
  • Successful logins from unusual IP addresses or at odd hours

Network Indicators:

  • HTTP requests to login page containing SQL keywords in parameters
  • Unusual database query patterns from the application server

SIEM Query:

source="application.log" AND ("sql" OR "syntax" OR "union" OR "select") AND "login"

🔗 References

📤 Share & Export