CVE-2025-4353

6.3 MEDIUM

📋 TL;DR

A critical SQL injection vulnerability exists in Brilliance Golden Link Secondary System through the /paraframework/queryTsDictionaryType.htm endpoint. Attackers can remotely exploit this by manipulating the dictCn1 parameter to execute arbitrary SQL commands. This affects all versions up to 20250424.

💻 Affected Systems

Products:
  • Brilliance Golden Link Secondary System
Versions: All versions up to 20250424
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the web interface component accessible via HTTP.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, data exfiltration, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Network Access Control

all

Restrict access to the vulnerable endpoint using firewall rules or network segmentation.

🧯 If You Can't Patch

  • Implement input validation and parameterized queries in the application code
  • Disable or block access to the /paraframework/queryTsDictionaryType.htm endpoint

🔍 How to Verify

Check if Vulnerable:

Test the /paraframework/queryTsDictionaryType.htm endpoint with SQL injection payloads in the dictCn1 parameter.

Check Version:

Check system version in administration interface or configuration files.

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and that input validation is properly implemented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following SQL injection patterns
  • Access to /paraframework/queryTsDictionaryType.htm with suspicious parameters

Network Indicators:

  • HTTP requests to vulnerable endpoint with SQL keywords in parameters
  • Unusual outbound database connections from web server

SIEM Query:

source="web_logs" AND uri="/paraframework/queryTsDictionaryType.htm" AND (param="dictCn1" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR 1=1")

🔗 References

📤 Share & Export