CVE-2024-1863

9.8 CRITICAL

📋 TL;DR

This is a critical SQL injection vulnerability in Sante PACS Server's token endpoint that allows unauthenticated remote attackers to execute arbitrary code. Attackers can exploit this by sending specially crafted HTTP requests to port 3000, potentially gaining SYSTEM-level access. All installations with the vulnerable component exposed are affected.

💻 Affected Systems

Products:
  • Sante PACS Server
Versions: Versions prior to the patch (specific version information not provided in advisory)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable endpoint is exposed by default on port 3000. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining SYSTEM privileges, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Database compromise, credential theft, lateral movement within the network, and installation of cryptocurrency miners or other malware.

🟢

If Mitigated

Limited impact due to network segmentation, but still potential for initial foothold and limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection leading to RCE with no authentication required makes this highly exploitable. ZDI has confirmed the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.santesoft.com/security-advisories/

Restart Required: Yes

Instructions:

1. Check SanteSoft security advisory for patch details
2. Download and install the latest patched version
3. Restart the Sante PACS Server service
4. Verify the patch is applied successfully

🔧 Temporary Workarounds

Network Access Control

windows

Block external access to port 3000/TCP using firewall rules

Windows Firewall: New-NetFirewallRule -DisplayName 'Block Sante PACS Port' -Direction Inbound -LocalPort 3000 -Protocol TCP -Action Block

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Sante PACS Server from internet and critical systems
  • Deploy intrusion detection/prevention systems with SQL injection signatures monitoring port 3000 traffic

🔍 How to Verify

Check if Vulnerable:

Check if Sante PACS Server is running and listening on port 3000. Review version against vendor's patched version list.

Check Version:

Check Sante PACS Server administration interface or installation directory for version information

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version from vendor advisory. Test that SQL injection payloads no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Failed authentication attempts on token endpoint
  • Unexpected process creation from Sante PACS service

Network Indicators:

  • SQL injection patterns in HTTP requests to port 3000
  • Unusual outbound connections from Sante PACS Server
  • High volume of requests to /token endpoint

SIEM Query:

source="web_server" dest_port=3000 AND (http_uri="*token*" AND (http_query="*SELECT*" OR http_query="*UNION*" OR http_query="*OR 1=1*"))

🔗 References

📤 Share & Export