CVE-2024-44542

9.8 CRITICAL

📋 TL;DR

A SQL injection vulnerability in ToDesk v1.1 allows remote attackers to execute arbitrary SQL commands via the /todesk.com/news.html parameter. This can lead to unauthorized data access, modification, or deletion. All users running ToDesk v1.1 are affected.

💻 Affected Systems

Products:
  • ToDesk
Versions: v1.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of ToDesk v1.1 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via SQL injection leading to remote code execution, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Database compromise allowing data theft, privilege escalation, or denial of service through data manipulation.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates exploitation via crafted HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates and upgrade to a patched version when released.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Network Segmentation

all

Restrict access to ToDesk services to trusted networks only.

🧯 If You Can't Patch

  • Disable or block access to the /todesk.com/news.html endpoint via firewall rules.
  • Implement strict input validation and parameterized queries in custom code if source is available.

🔍 How to Verify

Check if Vulnerable:

Check if ToDesk version is 1.1 via application interface or installed program list.

Check Version:

Check application 'About' section or installed programs list on respective OS.

Verify Fix Applied:

Verify upgrade to a version later than 1.1 or apply workarounds and test with SQL injection payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • HTTP requests with SQL injection patterns to /todesk.com/news.html

Network Indicators:

  • HTTP traffic containing SQL keywords (SELECT, UNION, etc.) targeting the vulnerable endpoint

SIEM Query:

source="web_logs" AND uri="/todesk.com/news.html" AND (payload="' OR " OR "SELECT" OR "UNION")

🔗 References

📤 Share & Export