CVE-2025-6276
📋 TL;DR
This CVE describes a critical SQL injection vulnerability in the Brilliance Golden Link Secondary System. Attackers can exploit the 'custTradeName' parameter in the /storagework/rentTakeInfoPage.htm file to execute arbitrary SQL commands remotely. Organizations using affected versions of this system are at risk of data breaches and system compromise.
💻 Affected Systems
- Brilliance Golden Link Secondary System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data manipulation, or full system takeover through SQL injection to RCE chaining.
Likely Case
Unauthorized access to sensitive data, including customer information, financial records, and system credentials stored in the database.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages or minor data exposure.
🎯 Exploit Status
Public proof-of-concept available on GitHub; remote exploitation with no authentication required makes this easily weaponizable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Monitor vendor channels for updates and apply immediately when released.
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rules
allImplement WAF rules to block SQL injection patterns targeting the custTradeName parameter
Input Validation Filter
allAdd server-side input validation to sanitize the custTradeName parameter before processing
🧯 If You Can't Patch
- Isolate the affected system from internet access and restrict to internal network only
- Implement strict network segmentation and monitor all traffic to/from the vulnerable endpoint
🔍 How to Verify
Check if Vulnerable:
Test the /storagework/rentTakeInfoPage.htm endpoint with SQL injection payloads in the custTradeName parameter
Check Version:
Check system version through administrative interface or configuration files
Verify Fix Applied:
Verify that SQL injection attempts no longer succeed and return appropriate error handling
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in application logs
- Unusual database queries from web application
- Multiple failed parameter validation attempts
Network Indicators:
- HTTP requests to /storagework/rentTakeInfoPage.htm with SQL keywords in parameters
- Unusual database connection patterns from web server
SIEM Query:
source="web_logs" AND uri="/storagework/rentTakeInfoPage.htm" AND (param="custTradeName" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR 1=1")
🔗 References
- https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FrentTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md
- https://vuldb.com/?ctiid.313280
- https://vuldb.com/?id.313280
- https://vuldb.com/?submit.593067
- https://github.com/eeeeeekkkkkkkk/POC/blob/main/%E9%BB%84%E9%87%91%E9%80%9A%E4%BA%8C%E7%BA%A7%E7%B3%BB%E7%BB%9F%E4%B8%89%E4%BB%A3%E7%AE%A1%E7%90%86%E7%AB%AF%E7%B3%BB%E7%BB%9FrentTakeInfoPage%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5.md