CVE-2025-11314

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary SQL commands via the 'sort' parameter in the findRolePage function of Tipray Data Leakage Prevention System. Successful exploitation could lead to unauthorized data access, modification, or deletion. Organizations using Tipray DLP version 1.0 are affected.

💻 Affected Systems

Products:
  • Tipray Data Leakage Prevention System
Versions: 1.0
Operating Systems: Unknown - likely Windows or Linux server deployments
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the findSingConfigPage.do file's findRolePage function. All deployments of version 1.0 appear vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the DLP database including exfiltration of sensitive data, credential theft, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to sensitive data protected by the DLP system, including potentially confidential documents and user information.

🟢

If Mitigated

Limited impact if proper network segmentation and database permissions are configured, though SQL injection could still reveal database structure.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: HIGH - Even internally deployed systems are vulnerable to authenticated or network-accessible attackers.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily weaponizable. The vendor has not responded to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the findSingConfigPage.do endpoint

Input Validation Filter

all

Add input validation for the 'sort' parameter to only allow expected values

🧯 If You Can't Patch

  • Isolate the DLP system behind a firewall with strict access controls
  • Implement network segmentation to limit database access from the DLP application

🔍 How to Verify

Check if Vulnerable:

Test the findSingConfigPage.do endpoint with SQL injection payloads in the 'sort' parameter

Check Version:

Check system version through administrative interface or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and return appropriate error handling

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts following SQL errors
  • Requests to findSingConfigPage.do with suspicious 'sort' parameters

Network Indicators:

  • Unusual database connections from the DLP application server
  • SQL error messages in HTTP responses

SIEM Query:

source="*dlp*" AND ("findSingConfigPage.do" OR "SQL" OR "syntax")

🔗 References

📤 Share & Export