CVE-2025-6276

6.3 MEDIUM

📋 TL;DR

This CVE describes a critical SQL injection vulnerability in the Brilliance Golden Link Secondary System. Attackers can exploit the 'custTradeName' parameter in the /storagework/rentTakeInfoPage.htm file to execute arbitrary SQL commands remotely. Organizations using affected versions of this system are at risk of data breaches and system compromise.

💻 Affected Systems

Products:
  • Brilliance Golden Link Secondary System
Versions: Up to and including 20250609
Operating Systems: Unknown - likely web application platform independent
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the rentTakeInfoPage interface specifically; other components may also be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, or full system takeover through SQL injection to RCE chaining.

🟠

Likely Case

Unauthorized access to sensitive data, including customer information, financial records, and system credentials stored in the database.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or minor data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub; remote exploitation with no authentication required makes this easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor vendor channels for updates and apply immediately when released.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the custTradeName parameter

Input Validation Filter

all

Add server-side input validation to sanitize the custTradeName parameter before processing

🧯 If You Can't Patch

  • Isolate the affected system from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor all traffic to/from the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test the /storagework/rentTakeInfoPage.htm endpoint with SQL injection payloads in the custTradeName parameter

Check Version:

Check system version through administrative interface or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and return appropriate error handling

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in application logs
  • Unusual database queries from web application
  • Multiple failed parameter validation attempts

Network Indicators:

  • HTTP requests to /storagework/rentTakeInfoPage.htm with SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/storagework/rentTakeInfoPage.htm" AND (param="custTradeName" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR 1=1")

🔗 References

📤 Share & Export