CVE-2026-24416

6.5 MEDIUM

📋 TL;DR

OpenSTAManager v2.9.8 and earlier contain a critical SQL injection vulnerability in the article pricing completion handler. Attackers can exploit this to extract sensitive database information through time-based blind SQL injection techniques. All users running affected versions are vulnerable.

💻 Affected Systems

Products:
  • OpenSTAManager
Versions: v2.9.8 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the article pricing completion handler are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of sensitive customer data, financial records, authentication credentials, and potential lateral movement to other systems.

🟠

Likely Case

Extraction of sensitive business data including customer information, financial records, and proprietary business data from the database.

🟢

If Mitigated

Limited data exposure if database permissions are properly restricted and network segmentation is in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to the article pricing functionality but does not require authentication. Time-based blind SQL injection requires specialized tools and knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.9.9 or later

Vendor Advisory: https://github.com/devcode-it/openstamanager/security/advisories/GHSA-p864-fqgv-92q4

Restart Required: Yes

Instructions:

1. Backup your database and application files. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with patched versions. 4. Restart the web server. 5. Verify the fix by testing the article pricing functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize the idarticolo parameter before processing

Implement parameterized queries or prepared statements for all database operations involving idarticolo

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules

Configure WAF to block requests containing SQL injection patterns in the idarticolo parameter

🧯 If You Can't Patch

  • Implement network segmentation to isolate OpenSTAManager from sensitive systems
  • Deploy database monitoring to detect unusual query patterns and access attempts

🔍 How to Verify

Check if Vulnerable:

Check if your OpenSTAManager version is 2.9.8 or earlier and if the article pricing functionality is accessible

Check Version:

Check the version.php file or application settings for version information

Verify Fix Applied:

Test the article pricing completion handler with SQL injection payloads and verify they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusually long response times from article pricing requests
  • Multiple failed requests to article pricing endpoints with SQL-like patterns

Network Indicators:

  • Repeated requests to article pricing endpoints with varying idarticolo parameters
  • Requests containing SQL keywords like SLEEP, WAITFOR, BENCHMARK

SIEM Query:

source="web_server_logs" AND (uri="*article*pricing*" OR uri="*idarticolo*") AND (response_time>5000 OR request_contains("SLEEP") OR request_contains("WAITFOR"))

🔗 References

📤 Share & Export