CVE-2025-2113
📋 TL;DR
This critical SQL injection vulnerability in AT Software Solutions ATSVD allows attackers to execute arbitrary SQL commands through the 'Esqueceu a senha' (forgot password) component by manipulating the txtCPF parameter. Organizations using ATSVD versions up to 3.4.1 are affected, potentially exposing sensitive database information. Remote exploitation is possible without authentication.
💻 Affected Systems
- AT Software Solutions ATSVD
📦 What is this software?
Atsvd by Atgroup
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data exfiltration, privilege escalation, and potential remote code execution on the database server.
Likely Case
Unauthorized access to sensitive user data, password hashes, and potential authentication bypass.
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-sensitive data.
🎯 Exploit Status
Exploit has been publicly disclosed and may be used. SQL injection through parameter manipulation is typically straightforward to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.4.2
Vendor Advisory: Not provided in references
Restart Required: No
Instructions:
1. Download ATSVD version 3.4.2 from official vendor sources. 2. Backup current installation and database. 3. Apply the update following vendor documentation. 4. Verify the 'Esqueceu a senha' functionality works correctly.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to restrict txtCPF parameter to expected format (CPF numbers only)
WAF Rule
allDeploy web application firewall rules to block SQL injection patterns targeting the forgot password endpoint
🧯 If You Can't Patch
- Disable the 'Esqueceu a senha' functionality entirely if not required
- Implement network segmentation to restrict access to ATSVD instances
🔍 How to Verify
Check if Vulnerable:
Check ATSVD version in admin interface or configuration files. If version is 3.4.1 or earlier, system is vulnerable.
Check Version:
Check application configuration or admin panel for version information
Verify Fix Applied:
Confirm version is 3.4.2 or later. Test the forgot password functionality with various inputs to ensure proper input validation.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed password reset attempts with unusual parameter values
- Database queries with unexpected syntax from application
Network Indicators:
- HTTP requests to forgot password endpoint with SQL injection patterns in parameters
- Unusual database traffic patterns from application server
SIEM Query:
source="application_logs" AND ("sql error" OR "syntax error" OR "unclosed quotation") AND uri="*/esqueceu-senha*"