CVE-2025-7801

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in BossSoft CRM 6.0 allows remote attackers to execute arbitrary SQL commands via the 'cstid' parameter in the /crm/module/HNDCBas_customPrmSearchDtl.jsp file. Organizations using BossSoft CRM 6.0 are affected, particularly those with internet-facing instances.

💻 Affected Systems

Products:
  • BossSoft CRM
Versions: 6.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of BossSoft CRM 6.0 with the vulnerable JSP file are affected. The vulnerability is in the application code itself.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, authentication bypass, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access and extraction from the CRM database, potentially exposing sensitive customer information and business data.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found in provided references

Restart Required: No

Instructions:

1. Contact BossSoft vendor for patch information. 2. If patch available, download and apply following vendor instructions. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Block SQL injection attempts targeting the vulnerable endpoint

WAF specific - configure rule to block requests containing SQL keywords targeting /crm/module/HNDCBas_customPrmSearchDtl.jsp

Input Validation Filter

all

Implement input validation for the cstid parameter

Modify HNDCBas_customPrmSearchDtl.jsp to validate cstid parameter using regex: ^[a-zA-Z0-9_-]+$

🧯 If You Can't Patch

  • Block external access to /crm/module/HNDCBas_customPrmSearchDtl.jsp via firewall or reverse proxy
  • Implement network segmentation to isolate CRM system from sensitive networks

🔍 How to Verify

Check if Vulnerable:

Test by sending a request to /crm/module/HNDCBas_customPrmSearchDtl.jsp?cstid=1' AND '1'='1 and checking for SQL error responses or unexpected behavior.

Check Version:

Check CRM version in application interface or configuration files (typically in web.xml or version.txt files)

Verify Fix Applied:

After applying fixes, test with same SQL injection payloads and verify no SQL errors or data leakage occurs.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /crm/module/HNDCBas_customPrmSearchDtl.jsp with SQL keywords in parameters
  • Database error logs showing SQL syntax errors from CRM application

Network Indicators:

  • Unusual database connections from web server
  • Large data transfers from CRM database

SIEM Query:

source="web_logs" AND uri="/crm/module/HNDCBas_customPrmSearchDtl.jsp" AND (query_string="*sql*" OR query_string="*union*" OR query_string="*select*" OR query_string="*' OR '1'='1*")

🔗 References

📤 Share & Export