CVE-2025-41372

8.8 HIGH

📋 TL;DR

An authenticated SQL injection vulnerability in Gandia Integra Total of TESI allows attackers to manipulate database operations through the 'idestudio' parameter. This affects organizations using versions 2.1.2217.3 through 4.4.2236.1 of the software, potentially compromising sensitive data integrity and confidentiality.

💻 Affected Systems

Products:
  • Gandia Integra Total of TESI
Versions: 2.1.2217.3 to 4.4.2236.1
Operating Systems: Not specified - likely web application platform independent
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the vulnerable endpoint /encuestas/integraweb[_v4]/integra/html/view/informe_campo_entrevistas.php

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, data destruction, privilege escalation, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive survey/interview data, manipulation of business-critical information, and potential data corruption.

🟢

If Mitigated

Limited impact due to proper input validation, parameterized queries, and database permission restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but SQL injection is a well-understood attack vector with many available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 4.4.2236.1

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi

Restart Required: Yes

Instructions:

1. Contact TESI vendor for patched version. 2. Backup current installation and data. 3. Apply vendor-provided patch or upgrade to version after 4.4.2236.1. 4. Restart application services. 5. Verify fix implementation.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize 'idestudio' parameter input

Implement parameterized queries or prepared statements in PHP code
Add input validation: if(!is_numeric($_GET['idestudio'])) { die('Invalid input'); }

Web Application Firewall Rules

all

Block SQL injection patterns targeting the vulnerable endpoint

WAF rule: deny requests to /encuestas/integraweb*/integra/html/view/informe_campo_entrevistas.php with SQL injection patterns in parameters

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to vulnerable endpoint to authorized users only
  • Enable detailed logging and monitoring for SQL injection attempts on the affected endpoint

🔍 How to Verify

Check if Vulnerable:

Test the 'idestudio' parameter with SQL injection payloads (e.g., ' OR '1'='1) and observe database behavior

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Attempt SQL injection tests after patch - should return error messages or no data manipulation

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from web application
  • Multiple failed login attempts followed by SQL injection patterns
  • Unexpected database error messages in application logs

Network Indicators:

  • HTTP requests to vulnerable endpoint with SQL keywords in parameters
  • Unusual database traffic patterns from web server

SIEM Query:

source="web_logs" AND uri="/encuestas/integraweb*/integra/html/view/informe_campo_entrevistas.php" AND (param="idestudio" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|--|#|;|')")

🔗 References

📤 Share & Export