CVE-2025-2353

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in VAM Virtual Airlines Manager allows remote attackers to execute arbitrary SQL commands through manipulated HTTP GET parameters. Affected systems include all installations of VAM Virtual Airlines Manager up to version 2.6.2 that expose the vulnerable component.

💻 Affected Systems

Products:
  • VAM Virtual Airlines Manager
Versions: up to 2.6.2
Operating Systems: Any OS running PHP and MySQL/MariaDB
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with the vulnerable /vam/index.php endpoint accessible are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized data access, privilege escalation, and potential data exfiltration from the VAM database.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, though SQL injection attempts would still be logged.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but requires network access to the vulnerable endpoint.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and can be launched remotely without authentication via HTTP GET parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - vendor did not respond to disclosure

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

PHP

Implement parameterized queries and input validation for all HTTP GET parameters in /vam/index.php

Modify PHP code to use prepared statements: $stmt = $pdo->prepare('SELECT * FROM table WHERE id = ?'); $stmt->execute([$id]);

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns in HTTP GET parameters

Add WAF rule: SecRule ARGS_GET "@detectSQLi" "id:1001,phase:2,deny,status:403"

🧯 If You Can't Patch

  • Restrict access to /vam/index.php endpoint using network ACLs or authentication
  • Implement database user with minimal privileges (read-only if possible) for the application

🔍 How to Verify

Check if Vulnerable:

Test by sending crafted SQL injection payloads to /vam/index.php with ID, registry_id, or plane_icao parameters

Check Version:

Check VAM version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return error pages or sanitized responses

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in GET parameters
  • Multiple failed SQL queries from single IP
  • Database error messages in web logs

Network Indicators:

  • HTTP requests with SQL keywords in GET parameters (SELECT, UNION, INSERT, etc.)
  • Unusual database port traffic from web server

SIEM Query:

source="web_logs" AND (url="*/vam/index.php*" AND (param="*SELECT*" OR param="*UNION*" OR param="*INSERT*"))

🔗 References

📤 Share & Export