CVE-2025-10460

N/A Unknown

📋 TL;DR

This SQL injection vulnerability in BEIMS Contractor Web allows unauthenticated attackers to execute arbitrary SQL commands through the contractor.asp endpoint. This can lead to complete database compromise including data theft, modification, or deletion. All users of this legacy software are affected since the vendor no longer maintains or patches it.

💻 Affected Systems

Products:
  • BEIMS Contractor Web
Versions: All versions, confirmed vulnerable in version 5.7.139
Operating Systems: Windows (typical for ASP applications)
Default Config Vulnerable: ⚠️ Yes
Notes: Legacy product with no vendor support. All installations should be considered vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, data destruction, and potential system takeover via command execution.

🟠

Likely Case

Unauthorized access to sensitive contractor data, financial information, and system credentials stored in the database.

🟢

If Mitigated

Limited impact if proper network segmentation and input validation controls are implemented.

🌐 Internet-Facing: HIGH - Direct internet exposure allows remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are well-understood and easily weaponized. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://help.fmiworks.com/knowledge/beims-web

Restart Required: No

Instructions:

No official patch exists. Vendor has discontinued support. Consider migration to supported alternatives.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious requests.

Network Access Control

all

Restrict access to the contractor.asp endpoint using firewall rules or network segmentation.

🧯 If You Can't Patch

  • Isolate the BEIMS Contractor Web server in a separate network segment with strict access controls
  • Implement input validation at the application layer or through reverse proxy

🔍 How to Verify

Check if Vulnerable:

Test the /BEIMSWeb/contractor.asp endpoint with SQL injection payloads (e.g., ' OR '1'='1) in parameters.

Check Version:

Check application version in web interface or configuration files.

Verify Fix Applied:

Verify WAF rules are blocking SQL injection attempts or that the endpoint is no longer accessible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL syntax
  • Requests to contractor.asp with suspicious parameters

Network Indicators:

  • Unusual database connection patterns
  • Outbound data transfers from the database server
  • SQL keywords in HTTP requests to the vulnerable endpoint

SIEM Query:

source="web_logs" AND uri="/BEIMSWeb/contractor.asp" AND (param CONTAINS "UNION" OR param CONTAINS "SELECT" OR param CONTAINS "OR '1'='1")

🔗 References

📤 Share & Export