CVE-2025-1641

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Benner ModernaNet allows remote attackers to execute arbitrary SQL commands through the /AGE0000700/GetHorariosDoDia endpoint. Organizations using ModernaNet versions up to 1.1.0 are affected, potentially exposing sensitive database information.

💻 Affected Systems

Products:
  • Benner ModernaNet
Versions: up to version 1.1.0
Operating Systems: Not specified - likely web application platform independent
Default Config Vulnerable: ⚠️ Yes
Notes: All installations up to version 1.1.0 are vulnerable by default. The specific endpoint with parameters is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized access to sensitive patient/medical data, appointment information, and potential privilege escalation within the application.

🟢

If Mitigated

Limited information disclosure if proper input validation and WAF rules are in place.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects a web application endpoint.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to gain unauthorized access to sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting SQL injection payloads in the vulnerable parameters. No authentication bypass mentioned, but endpoint may be accessible without full authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.1

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Download ModernaNet version 1.1.1 from official vendor sources. 2. Backup current installation and database. 3. Apply the update following vendor documentation. 4. Verify the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the vulnerable endpoint

WAF specific - configure rules to block SQL injection patterns in /AGE0000700/GetHorariosDoDia parameters

Input Validation Filter

all

Add server-side input validation for the vulnerable parameters

Application specific - implement parameter validation/sanitization for idespec, idproced, data, agserv, convenio, localatend, idplano, pesfis, idprofissional parameters

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to the ModernaNet application
  • Deploy a web application firewall with SQL injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check if the application responds to SQL injection payloads in the /AGE0000700/GetHorariosDoDia endpoint parameters (use safe testing methods only).

Check Version:

Check application version through admin interface or configuration files (specific command depends on deployment).

Verify Fix Applied:

Test the vulnerable endpoint with SQL injection payloads after patching - should return error messages or no data leakage.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple rapid requests to /AGE0000700/GetHorariosDoDia with suspicious parameter values
  • Database query errors containing SQL syntax

Network Indicators:

  • HTTP requests to /AGE0000700/GetHorariosDoDia with SQL keywords in parameters
  • Unusual database connection patterns from application server

SIEM Query:

web.url:"*/AGE0000700/GetHorariosDoDia*" AND (http.param:*SQL* OR http.param:*UNION* OR http.param:*SELECT* OR http.param:*INSERT* OR http.param:*UPDATE* OR http.param:*DELETE*)

🔗 References

📤 Share & Export