CVE-2025-57140

9.8 CRITICAL

📋 TL;DR

CVE-2025-57140 is a critical SQL injection vulnerability in rsbi-pom 4.7 that allows attackers to execute arbitrary SQL commands through the /bi/service/model/DatasetService endpoint. This affects all deployments using the vulnerable version of rsbi-pom, potentially exposing database contents and enabling data manipulation or exfiltration.

💻 Affected Systems

Products:
  • rsbi-pom
Versions: 4.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using the vulnerable version regardless of configuration. The /bi/service/model/DatasetService endpoint appears to be a core component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, privilege escalation to database administrator, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized data access, extraction of sensitive business intelligence data, and potential data manipulation affecting reporting accuracy.

🟢

If Mitigated

Limited impact with proper input validation and database permission restrictions, potentially only allowing read access to non-sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are well-understood attack vectors with numerous automated tools available. The public GitHub issue suggests exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/ruisibi/rsbi-pom

Restart Required: Yes

Instructions:

1. Monitor the official rsbi-pom repository for security updates. 2. Check if version 4.8 or later addresses this vulnerability. 3. Apply the patch following vendor instructions. 4. Restart the rsbi-pom service.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for the DatasetService endpoint

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint

🧯 If You Can't Patch

  • Implement network segmentation to isolate rsbi-pom instances and restrict database access
  • Apply principle of least privilege to database accounts used by rsbi-pom

🔍 How to Verify

Check if Vulnerable:

Check if rsbi-pom version 4.7 is installed and the /bi/service/model/DatasetService endpoint is accessible

Check Version:

Check application configuration files or deployment manifests for rsbi-pom version

Verify Fix Applied:

Verify installation of patched version and test the vulnerable endpoint with SQL injection payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts via DatasetService
  • Unexpected database schema changes

Network Indicators:

  • SQL injection patterns in HTTP requests to /bi/service/model/DatasetService
  • Unusual outbound database connections from application servers

SIEM Query:

source="web_logs" AND uri="/bi/service/model/DatasetService" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "INSERT" OR request_body CONTAINS "DELETE")

🔗 References

📤 Share & Export