CVE-2025-41370

8.8 HIGH

📋 TL;DR

A SQL injection vulnerability in Gandia Integra Total of TESI allows authenticated attackers to manipulate database operations through the 'idestudio' parameter. This affects versions 2.1.2217.3 through 4.4.2236.1, enabling data theft, modification, or deletion.

💻 Affected Systems

Products:
  • Gandia Integra Total of TESI
Versions: 2.1.2217.3 to 4.4.2236.1
Operating Systems: Any OS running the software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit; vulnerable in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive data exfiltration, privilege escalation, and system takeover.

🟠

Likely Case

Unauthorized data access and manipulation by authenticated malicious users or compromised accounts.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and least privilege database accounts.

🌐 Internet-Facing: HIGH if the vulnerable endpoint is exposed to the internet, allowing remote exploitation.
🏢 Internal Only: HIGH as authenticated users (including compromised accounts) can exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection via parameter manipulation is well-understood; exploitation requires authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 4.4.2236.1

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi

Restart Required: Yes

Instructions:

1. Check current version. 2. Upgrade to latest version beyond 4.4.2236.1. 3. Restart application services. 4. Verify fix.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize 'idestudio' parameter values.

Modify /encuestas/integraweb/html/view/acceso.php to validate 'idestudio' as integer using is_numeric() or similar.

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Configure WAF to detect and block SQL injection attempts on /encuestas/integraweb/html/view/acceso.php.

🧯 If You Can't Patch

  • Restrict access to the vulnerable endpoint using network ACLs or authentication controls.
  • Implement database-level controls: use least privilege accounts, enable auditing, and monitor for suspicious queries.

🔍 How to Verify

Check if Vulnerable:

Test the 'idestudio' parameter in /encuestas/integraweb/html/view/acceso.php with SQL injection payloads (e.g., ' OR '1'='1).

Check Version:

Check software version in admin interface or configuration files.

Verify Fix Applied:

After patching, retest with SQL injection payloads; ensure no database manipulation occurs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by parameter manipulation

Network Indicators:

  • HTTP requests to /encuestas/integraweb/html/view/acceso.php with SQL keywords in parameters

SIEM Query:

source="web_logs" AND uri="/encuestas/integraweb/html/view/acceso.php" AND (param="idestudio" AND value CONTAINS "' OR" OR value CONTAINS "UNION" OR value CONTAINS "SELECT")

🔗 References

📤 Share & Export