CVE-2025-59742

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in AndSoft's e-TMS v25.03 allows attackers to execute arbitrary SQL commands via the USRMAIL parameter in login forms. Attackers can retrieve, modify, or delete database contents, potentially compromising the entire application. Organizations using AndSoft e-TMS v25.03 are affected.

💻 Affected Systems

Products:
  • AndSoft e-TMS
Versions: v25.03
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: ASP-based application requiring Microsoft IIS and SQL Server backend.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, and potential system takeover via privilege escalation.

🟠

Likely Case

Unauthorized data access and modification, potentially leading to business disruption and data breach.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, though SQL injection attempts may still be logged.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple POST request manipulation required, no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v25.04 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/update-24092025-multiple-vulnerabilities-andsofts-e-tms

Restart Required: Yes

Instructions:

1. Download latest version from AndSoft vendor portal. 2. Backup current installation and database. 3. Install update following vendor instructions. 4. Restart IIS and application services.

🔧 Temporary Workarounds

Input Validation Filter

windows

Add input validation to reject SQL injection patterns in USRMAIL parameter

Add parameter validation in TRACK_REQUESTFRMSQL.ASP to sanitize USRMAIL input

WAF Rule

all

Implement web application firewall rules to block SQL injection patterns

Configure WAF to block requests containing SQL keywords in USRMAIL parameter

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to e-TMS application
  • Enable detailed logging and monitoring for SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Test USRMAIL parameter with SQL injection payloads in POST requests to /inc/login/TRACK_REQUESTFRMSQL.ASP

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Verify parameter validation rejects SQL injection attempts and check application version is v25.04+

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts with SQL patterns

Network Indicators:

  • POST requests to vulnerable endpoint with SQL keywords
  • Unusual database query patterns

SIEM Query:

source="web_logs" AND uri="/inc/login/TRACK_REQUESTFRMSQL.ASP" AND (payload CONTAINS "UNION" OR payload CONTAINS "SELECT" OR payload CONTAINS "INSERT")

🔗 References

📤 Share & Export