CVE-2025-8163

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in deerwms deer-wms-2 allows remote attackers to execute arbitrary SQL commands via the params[dataScope] parameter in the /system/role/list endpoint. Attackers can potentially read, modify, or delete database contents, and in worst cases gain full system control. All users running deer-wms-2 versions up to 3.3 are affected.

💻 Affected Systems

Products:
  • deerwms deer-wms-2
Versions: up to version 3.3
Operating Systems: Any OS running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable endpoint accessible are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, privilege escalation to administrative access, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized data access and extraction, including sensitive user information, configuration data, and business records stored in the database.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permission restrictions preventing data modification or system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed, making weaponization straightforward for attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.4 or later

Vendor Advisory: https://gitee.com/deerwms/deer-wms-2/issues/ICLQFL

Restart Required: Yes

Instructions:

1. Backup your current deployment and database. 2. Download the latest version from the official repository. 3. Replace the affected files with patched versions. 4. Restart the application service. 5. Verify the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns targeting the /system/role/list endpoint and params[dataScope] parameter.

Endpoint Restriction

all

Restrict access to the /system/role/list endpoint using network ACLs or authentication requirements.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all user inputs in the application code.
  • Apply network segmentation to isolate the vulnerable system and restrict database access to only necessary services.

🔍 How to Verify

Check if Vulnerable:

Test the /system/role/list endpoint with SQL injection payloads in the params[dataScope] parameter and observe if database errors or unexpected responses occur.

Check Version:

Check the application version in the admin interface or configuration files, or run: grep -r 'version' /path/to/deer-wms-2/ | head -5

Verify Fix Applied:

Attempt the same SQL injection tests after patching; successful fixes should return proper error handling or reject malicious input without database interaction.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in request logs for /system/role/list
  • Database error messages containing SQL fragments
  • Multiple rapid requests to the vulnerable endpoint

Network Indicators:

  • SQL keywords (SELECT, UNION, INSERT, etc.) in HTTP parameters
  • Unusual database connection patterns from the application server

SIEM Query:

source="web_logs" AND uri="/system/role/list" AND (params CONTAINS "SELECT" OR params CONTAINS "UNION" OR params CONTAINS "INSERT" OR params CONTAINS "DELETE")

🔗 References

📤 Share & Export