CVE-2024-53007

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users of Bentley Systems ProjectWise Integration Server to execute unintended SQL queries through API calls. This could lead to data manipulation, unauthorized data access, or denial of service. Only organizations running vulnerable versions of ProjectWise Integration Server are affected.

💻 Affected Systems

Products:
  • Bentley Systems ProjectWise Integration Server
Versions: All versions before 10.00.03.288
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the ProjectWise Integration Server API.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could execute arbitrary SQL commands, potentially leading to data exfiltration, data corruption, or complete system compromise.

🟠

Likely Case

Authenticated users could inadvertently or intentionally execute SQL queries that modify or expose sensitive project data.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to authorized users' legitimate access scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated API access but SQL injection techniques are well-understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.00.03.288

Vendor Advisory: https://www.bentley.com/advisories/be-2024-0002/

Restart Required: Yes

Instructions:

1. Download ProjectWise Integration Server version 10.00.03.288 or later from Bentley's software downloads
2. Backup current configuration and databases
3. Run the installer to upgrade
4. Restart the ProjectWise Integration Server service

🔧 Temporary Workarounds

Restrict API Access

all

Limit API access to only trusted users and applications through network segmentation and authentication controls.

Database Query Monitoring

all

Implement database activity monitoring to detect unusual SQL queries from the ProjectWise application.

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all ProjectWise user accounts
  • Deploy web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check ProjectWise Integration Server version in administrative console or via 'pwadmin' command line tool.

Check Version:

pwadmin -version

Verify Fix Applied:

Confirm version is 10.00.03.288 or later and test API calls that previously triggered SQL injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed API authentication attempts followed by successful complex queries
  • API calls with SQL-like syntax in parameters

Network Indicators:

  • Unusual volume of API requests to ProjectWise Integration Server
  • SQL error messages in HTTP responses

SIEM Query:

source="projectwise" AND (event_type="api_call" AND (message="*sql*" OR message="*select*" OR message="*union*"))

🔗 References

📤 Share & Export