CVE-2025-0392

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in Jeewms allows remote attackers to execute arbitrary SQL commands by manipulating the store_code parameter in the datagridGraph function. Organizations using Jeewms versions up to 20241229 are affected, potentially exposing database contents and system control. The vulnerability is remotely exploitable and public exploit code exists.

💻 Affected Systems

Products:
  • Guangzhou Huayi Intelligent Technology Jeewms
Versions: up to 20241229
Operating Systems: All platforms running Jeewms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the vulnerable /graphReportController.do endpoint are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized database access allowing extraction of sensitive information, modification of data, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code has been publicly disclosed on Gitee, making this easily exploitable by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20250101

Vendor Advisory: https://gitee.com/erzhongxmu/JEEWMS/issues/IBFK93

Restart Required: Yes

Instructions:

1. Backup your current Jeewms installation and database. 2. Download version 20250101 from the official source. 3. Replace the existing installation with the patched version. 4. Restart the Jeewms application server. 5. Verify the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the /graphReportController.do endpoint

Input Validation Filter

all

Add input validation for store_code parameter to reject suspicious characters

🧯 If You Can't Patch

  • Implement network segmentation to isolate Jeewms from critical systems
  • Deploy a web application firewall with SQL injection detection rules

🔍 How to Verify

Check if Vulnerable:

Test the /graphReportController.do endpoint with SQL injection payloads in the store_code parameter and observe database errors or unexpected responses.

Check Version:

Check the Jeewms version in the application interface or configuration files, typically in version.txt or application.properties

Verify Fix Applied:

After upgrading to 20250101, test the same SQL injection payloads and verify they are properly sanitized or rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts following SQL errors
  • Requests to /graphReportController.do with suspicious store_code parameters

Network Indicators:

  • Unusual database connection patterns from the Jeewms server
  • Large data transfers from the database server

SIEM Query:

source="jeewms_logs" AND (uri="/graphReportController.do" AND (param="store_code" AND value CONTAINS "' OR" OR value CONTAINS "--" OR value CONTAINS ";"))

🔗 References

📤 Share & Export