CVE-2025-11316

7.3 HIGH

📋 TL;DR

This CVE describes a SQL injection vulnerability in Tipray's Data Leakage Prevention System version 1.0. Attackers can exploit the findCategoryPage.do endpoint by manipulating the tenantId parameter to execute arbitrary SQL commands. The vulnerability is remotely exploitable and affects organizations using this specific Chinese data protection software.

💻 Affected Systems

Products:
  • Tipray Data Leakage Prevention System
Versions: 1.0
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Specific to Chinese-language Tipray DLP system. The vulnerability exists in the findCategoryPage.do endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the DLP database including exfiltration of sensitive data, credential theft, and potential lateral movement to connected systems.

🟠

Likely Case

Data exfiltration from the DLP system, including potentially sensitive information about data protection policies and monitored data.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. The vendor has not responded to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider workarounds or system replacement.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting the findCategoryPage.do endpoint

WAF-specific configuration commands

Network Segmentation

all

Restrict access to the DLP system to authorized internal networks only

firewall rules to limit access to specific IP ranges

🧯 If You Can't Patch

  • Isolate the DLP system from internet access and restrict to internal trusted networks only
  • Implement database-level protections: use least privilege accounts, enable SQL injection protection features

🔍 How to Verify

Check if Vulnerable:

Test the findCategoryPage.do endpoint with SQL injection payloads in the tenantId parameter

Check Version:

Check system version through administrative interface or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and return appropriate error messages

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or parameter manipulation in web logs

Network Indicators:

  • Unusual outbound database connections from DLP system
  • SQL error messages in HTTP responses

SIEM Query:

web.url:*findCategoryPage.do* AND (web.param:*tenantId* OR web.status:500)

🔗 References

📤 Share & Export