CVE-2024-41512

8.8 HIGH

📋 TL;DR

A SQL injection vulnerability in CADClick's ccHandler.aspx file allows remote attackers to execute arbitrary SQL commands via the bomid parameter. This affects all versions of CADClick v1.11.0 and earlier, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • CADClick
Versions: v1.11.0 and all earlier versions
Operating Systems: Windows (presumed based on ASP.NET technology)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable ccHandler.aspx file are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized data access, data exfiltration, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via web requests to ccHandler.aspx.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or unauthenticated attacks depending on configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via URL parameter is typically straightforward to exploit with common tools like sqlmap.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided in references

Restart Required: No

Instructions:

No official patch available. Contact vendor at http://cadclick.de/ or http://kimweb.de/ for updated version information.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize the bomid parameter

Not applicable - requires code modification

Web Application Firewall

all

Deploy WAF with SQL injection rules to block malicious requests

Not applicable - configuration dependent

🧯 If You Can't Patch

  • Isolate the CADClick application behind a reverse proxy with strict input validation
  • Implement network segmentation to limit database access from the application server

🔍 How to Verify

Check if Vulnerable:

Test ccHandler.aspx with SQL injection payloads in bomid parameter (e.g., ccHandler.aspx?bomid=1' OR '1'='1)

Check Version:

Check CADClick version in application interface or configuration files

Verify Fix Applied:

Verify parameterized queries or input validation is implemented in ccHandler.aspx code

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple requests to ccHandler.aspx with suspicious bomid values

Network Indicators:

  • HTTP requests containing SQL keywords in bomid parameter
  • Unusual database query patterns from application server

SIEM Query:

web.url="*ccHandler.aspx*" AND (web.param="*bomid=*'*" OR web.param="*bomid=*%27*")

🔗 References

📤 Share & Export