CVE-2025-5170
📋 TL;DR
This critical SQL injection vulnerability in llisoft MTA Maita Training System 4.5 allows remote attackers to execute arbitrary SQL commands via the stTypeIds parameter in the AdminShitiListRequestVo function. Organizations using this training system are affected, particularly those with internet-facing deployments.
💻 Affected Systems
- llisoft MTA Maita Training System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, and potential remote code execution on the database server.
Likely Case
Unauthorized access to sensitive training data, user information, and potential privilege escalation within the application.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.
🎯 Exploit Status
Exploit has been publicly disclosed. Attack requires access to the vulnerable endpoint, which appears to be in an admin controller.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: Yes
Instructions:
1. Contact llisoft for official patch
2. If no patch available, implement workarounds
3. Consider upgrading to a newer version if available
🔧 Temporary Workarounds
Input Validation Filter
allImplement strict input validation for stTypeIds parameter to allow only expected values
Implement parameterized queries or stored procedures in AdminShitiController.java
Web Application Firewall
allDeploy WAF with SQL injection rules to block malicious requests
Configure WAF to block SQL injection patterns targeting stTypeIds parameter
🧯 If You Can't Patch
- Isolate the application behind a reverse proxy with strict input validation
- Implement network segmentation to limit database access from application servers
🔍 How to Verify
Check if Vulnerable:
Check if AdminShitiController.java contains raw SQL queries with stTypeIds parameter concatenation
Check Version:
Check application version in system settings or configuration files
Verify Fix Applied:
Verify parameterized queries are used and input validation is implemented for stTypeIds
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts followed by SQL injection patterns
Network Indicators:
- HTTP requests with SQL injection payloads in stTypeIds parameter
- Unusual database traffic from application server
SIEM Query:
source="web_logs" AND (stTypeIds CONTAINS "' OR" OR stTypeIds CONTAINS "UNION" OR stTypeIds CONTAINS "SELECT")