CVE-2025-11629

6.3 MEDIUM

📋 TL;DR

This SQL injection vulnerability in RainyGao DocSys allows attackers to execute arbitrary SQL commands through the getUserList function. It affects all versions up to 2.02.36 and can be exploited remotely without authentication. Organizations using vulnerable DocSys installations are at risk of data theft, modification, or system compromise.

💻 Affected Systems

Products:
  • RainyGao DocSys
Versions: All versions up to and including 2.02.36
Operating Systems: All platforms running DocSys
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized access to sensitive user data, database manipulation, and potential lateral movement within the system.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider upgrading to any version above 2.02.36 if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation and parameterized queries for the getUserList function

Implement prepared statements with parameter binding in the affected Java code

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

Configure WAF to block requests containing SQL injection patterns to /Manage/getUserList.do

🧯 If You Can't Patch

  • Network segmentation: Isolate DocSys server from internet and restrict access to trusted IPs only
  • Database hardening: Implement least privilege database accounts and enable SQL injection protection at database level

🔍 How to Verify

Check if Vulnerable:

Test the /Manage/getUserList.do endpoint with SQL injection payloads (e.g., ' OR '1'='1) and observe database errors or unexpected responses

Check Version:

Check DocSys version in web interface or configuration files

Verify Fix Applied:

After implementing fixes, test with the same payloads and verify proper error handling or rejection of malicious input

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts or parameter manipulation in access logs
  • Requests to /Manage/getUserList.do with SQL keywords

Network Indicators:

  • Unusual database connections from web server
  • Large data transfers from database to external IPs

SIEM Query:

source="web_logs" AND uri="/Manage/getUserList.do" AND (payload CONTAINS "UNION" OR payload CONTAINS "SELECT" OR payload CONTAINS "OR '1'='1")

🔗 References

📤 Share & Export