CVE-2025-8161

6.3 MEDIUM

📋 TL;DR

A critical SQL injection vulnerability in deerwms deer-wms-2 allows remote attackers to execute arbitrary SQL commands via the params[dataScope] parameter in the /system/role/export endpoint. This affects all users running versions up to 3.3 of the software, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • deerwms deer-wms-2
Versions: up to version 3.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable endpoint accessible are affected. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, or deletion; potential remote code execution if database permissions allow; full system takeover.

🟠

Likely Case

Unauthorized data access and extraction from the database, potentially exposing sensitive business information and user credentials.

🟢

If Mitigated

Limited impact with proper input validation and database permission restrictions, potentially only allowing data enumeration without modification.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details have been publicly disclosed. Attack requires access to the vulnerable endpoint but may not require authentication depending on deployment configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://gitee.com/deerwms/deer-wms-2/issues/ICLQQG

Restart Required: No

Instructions:

1. Monitor the vendor repository for security updates. 2. Apply any available patches immediately. 3. Consider upgrading to a newer version if available.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the /system/role/export endpoint

Endpoint Restriction

linux

Block external access to /system/role/export endpoint using network controls

iptables -A INPUT -p tcp --dport [PORT] -m string --string "/system/role/export" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all database operations
  • Restrict database user permissions to minimum required privileges

🔍 How to Verify

Check if Vulnerable:

Check if your deer-wms-2 version is ≤3.3 and the /system/role/export endpoint is accessible

Check Version:

Check application configuration files or documentation for version information

Verify Fix Applied:

Test the vulnerable endpoint with SQL injection payloads after applying mitigations

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed attempts to access /system/role/export
  • Database error messages containing SQL syntax

Network Indicators:

  • HTTP requests to /system/role/export with SQL keywords in parameters
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND uri="/system/role/export" AND (params CONTAINS "UNION" OR params CONTAINS "SELECT" OR params CONTAINS "OR 1=1")

🔗 References

📤 Share & Export