CVE-2025-8124

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in deerwms deer-wms-2 allows remote attackers to execute arbitrary SQL commands via the params[dataScope] parameter in the /system/role/authUser/unallocatedList endpoint. Organizations using deer-wms-2 versions up to 3.3 are affected, potentially exposing sensitive database information.

💻 Affected Systems

Products:
  • deerwms deer-wms-2
Versions: Up to version 3.3
Operating Systems: All platforms running deer-wms-2
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the vulnerable endpoint are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, data manipulation, privilege escalation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information from the database, and potential authentication bypass.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but require network access; risk depends on internal network segmentation and access controls.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed, making exploitation straightforward for attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://gitee.com/deerwms/deer-wms-2/issues/ICLRF0

Restart Required: No

Instructions:

Check the vendor advisory for patch availability. If unavailable, implement workarounds immediately.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Block SQL injection attempts targeting the vulnerable endpoint

WAF specific - configure rule to block requests containing SQL injection patterns to /system/role/authUser/unallocatedList

Network Access Control

linux

Restrict access to the vulnerable endpoint

iptables -A INPUT -p tcp --dport [APP_PORT] -m string --string "/system/role/authUser/unallocatedList" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all user inputs
  • Deploy network segmentation to isolate the vulnerable system and limit lateral movement

🔍 How to Verify

Check if Vulnerable:

Test the /system/role/authUser/unallocatedList endpoint with SQL injection payloads in the params[dataScope] parameter

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and that input validation is properly implemented

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed authentication attempts
  • Requests to /system/role/authUser/unallocatedList with suspicious parameters

Network Indicators:

  • Unusual database connections from application server
  • Outbound data transfers following SQL injection patterns

SIEM Query:

source="application.logs" AND (url="/system/role/authUser/unallocatedList" AND (params CONTAINS "UNION" OR params CONTAINS "SELECT" OR params CONTAINS "--"))

🔗 References

📤 Share & Export