CVE-2024-57765

7.5 HIGH

📋 TL;DR

This SQL injection vulnerability in MSFM allows attackers to execute arbitrary SQL commands through the s_name parameter in the table/list functionality. Attackers could potentially read, modify, or delete database content. All users running MSFM versions before 2025.01.01 are affected.

💻 Affected Systems

Products:
  • MSFM
Versions: All versions before 2025.01.01
Operating Systems: All platforms running MSFM
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when using the table/list functionality with s_name parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized data access and extraction, potentially exposing sensitive information stored in the database.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

SQL injection requires understanding of the application's database structure and parameter usage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.01.01 or later

Vendor Advisory: https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVK9

Restart Required: No

Instructions:

1. Download MSFM version 2025.01.01 or later from official source. 2. Replace existing installation files with patched version. 3. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for s_name parameter to reject SQL injection patterns

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns in s_name parameter

🧯 If You Can't Patch

  • Implement parameterized queries or prepared statements for all database interactions
  • Deploy network segmentation to restrict database access from application servers

🔍 How to Verify

Check if Vulnerable:

Test s_name parameter with SQL injection payloads like ' OR '1'='1 and observe if database behavior changes

Check Version:

Check MSFM version in application interface or configuration files

Verify Fix Applied:

Attempt SQL injection tests after patch and verify they are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or parameter manipulation attempts in application logs

Network Indicators:

  • Unusual database connection patterns from application servers
  • SQL error messages in HTTP responses

SIEM Query:

source="application_logs" AND (s_name CONTAINS "' OR" OR s_name CONTAINS "--" OR s_name CONTAINS ";")

🔗 References

📤 Share & Export