CVE-2026-22197

8.1 HIGH

📋 TL;DR

This SQL injection vulnerability in GestSup allows authenticated attackers to manipulate database queries through asset list parameters. Attackers can access or modify database contents depending on their privileges. All GestSup instances running versions before 3.2.60 are affected.

💻 Affected Systems

Products:
  • GestSup
Versions: All versions prior to 3.2.60
Operating Systems: Any OS running GestSup
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; vulnerability exists in default asset list functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, or deletion; potential privilege escalation to administrative access; possible remote code execution if database supports stored procedures.

🟠

Likely Case

Unauthorized access to sensitive asset data, user information, and configuration details; potential data manipulation affecting business operations.

🟢

If Mitigated

Limited to authenticated user's data scope; database-level controls prevent privilege escalation; query results are sanitized before display.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection is well-understood; authenticated access required; parameter manipulation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.60

Vendor Advisory: https://gestsup.fr/index.php?page=changelog

Restart Required: Yes

Instructions:

1. Backup your GestSup database and configuration. 2. Download version 3.2.60 or later from official GestSup website. 3. Follow upgrade instructions in GestSup documentation. 4. Restart the GestSup service. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to block SQL injection patterns in asset list parameters

Database Privilege Reduction

all

Restrict database user permissions to read-only for application accounts

GRANT SELECT ON gestsup.* TO 'appuser'@'localhost';
REVOKE INSERT, UPDATE, DELETE, DROP, CREATE ON gestsup.* FROM 'appuser'@'localhost';

🧯 If You Can't Patch

  • Implement strict input validation for all asset list parameters using allowlists
  • Deploy web application firewall with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check GestSup version in administration panel or by examining the application files; versions below 3.2.60 are vulnerable

Check Version:

Check GestSup admin interface or examine version.php file in installation directory

Verify Fix Applied:

Confirm version is 3.2.60 or higher in administration panel; test asset list functionality with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by asset list access
  • Asset list requests with SQL keywords in parameters

Network Indicators:

  • HTTP requests to asset list endpoints containing SQL syntax in parameters
  • Unusual database query volume from application server

SIEM Query:

source="web_logs" AND (uri="*asset*" OR uri="*liste*") AND (param="*SELECT*" OR param="*UNION*" OR param="*OR 1=1*")

🔗 References

📤 Share & Export