CVE-2025-15450

6.3 MEDIUM

📋 TL;DR

This CVE describes a SQL injection vulnerability in the sfturing hosp_order software's findOrderHosNum function. Attackers can exploit this by manipulating hospitalAddress or hospitalName parameters to execute arbitrary SQL commands. The vulnerability affects all versions up to commit 627f426331da8086ce8fff2017d65b1ddef384f8 and can be exploited remotely.

💻 Affected Systems

Products:
  • sfturing hosp_order
Versions: All versions up to commit 627f426331da8086ce8fff2017d65b1ddef384f8
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: The product does not use versioning, making precise version identification difficult. All deployments using the vulnerable code are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, or deletion of critical healthcare order information

🟠

Likely Case

Unauthorized access to sensitive patient and hospital data, potential data exfiltration

🟢

If Mitigated

Limited impact with proper input validation and database permissions in place

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely and exploit code is publicly available
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the application

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub issues. The vendor has not responded to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - vendor unresponsive

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider implementing parameterized queries or input validation as workaround.

🔧 Temporary Workarounds

Implement Input Validation

all

Add strict input validation for hospitalAddress and hospitalName parameters to reject SQL injection attempts

# Modify findOrderHosNum function to validate inputs
# Example: Use regex to validate allowed characters
# Implement parameterized queries instead of string concatenation

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint

# Example ModSecurity rule:
# SecRule ARGS:hospitalAddress "@detectSQLi" "id:1001,phase:2,deny,status:403"

🧯 If You Can't Patch

  • Isolate the application behind a reverse proxy with strict input filtering
  • Implement database-level controls: use least privilege accounts, enable audit logging

🔍 How to Verify

Check if Vulnerable:

Test the /ssm_pro/orderHos/ endpoint with SQL injection payloads in hospitalAddress or hospitalName parameters

Check Version:

Check git commit hash: git log --oneline -1

Verify Fix Applied:

Verify that parameterized queries are implemented and SQL injection attempts are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or parameter manipulation in application logs

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) in hospitalAddress/hospitalName parameters

SIEM Query:

source="web_logs" AND (hospitalAddress="*SELECT*" OR hospitalName="*UNION*")

🔗 References

📤 Share & Export