CVE-2024-51165

7.5 HIGH

📋 TL;DR

This SQL injection vulnerability in JEPAAS 7.2.8 allows remote attackers to execute arbitrary SQL queries through the dateVal parameter in the /je/rbac/rbac/loadLoginCount endpoint. Successful exploitation could lead to complete database compromise, exposing all stored information including user credentials and sensitive business data. Organizations using JEPAAS 7.2.8 are affected.

💻 Affected Systems

Products:
  • JEPAAS
Versions: 7.2.8
Operating Systems: All platforms running JEPAAS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of JEPAAS 7.2.8. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, credential theft, privilege escalation, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive data including user credentials, personal information, and business data stored in the database.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database access controls in place.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has publicly available proof-of-concept code, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor JEPAAS vendor for official patch or advisory. 2. Apply patch immediately when available. 3. Test patch in non-production environment first.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize the dateVal parameter before processing.

Implement parameterized queries or prepared statements for the loadLoginCount endpoint

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Add WAF rule: Block requests to /je/rbac/rbac/loadLoginCount containing SQL keywords in dateVal parameter

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to JEPAAS instances
  • Deploy database monitoring to detect unusual SQL query patterns

🔍 How to Verify

Check if Vulnerable:

Test the /je/rbac/rbac/loadLoginCount endpoint with SQL injection payloads in the dateVal parameter (e.g., dateVal=2024-01-01' OR '1'='1).

Check Version:

Check JEPAAS version in application interface or configuration files; default installation shows version in admin panel.

Verify Fix Applied:

Retest with SQL injection payloads after implementing fixes; successful payloads should be rejected or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts with SQL patterns in parameters
  • Requests to /je/rbac/rbac/loadLoginCount with suspicious dateVal values

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) in URL parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND url_path="/je/rbac/rbac/loadLoginCount" AND (param="dateVal" AND value MATCHES "[';]|UNION|SELECT")

🔗 References

📤 Share & Export