CVE-2019-25692
Infor · Kados R10 GreenBee
Kados R10 GreenBee is susceptible to SQL injection via the 'id_to_modify' parameter, allowing unauthorized database query manipulation.
Executive summary
The Kados R10 GreenBee platform suffers from an SQL injection vulnerability that could allow unauthorized modification or exfiltration of database records.
Vulnerability
This vulnerability occurs because the 'id_to_modify' parameter is not adequately sanitized before being used in database queries. This flaw allows an attacker to inject SQL commands, potentially altering database content.
Business impact
Exploitation of this vulnerability could lead to the unauthorized modification of critical business data, resulting in significant operational disruption and loss of data integrity. With a CVSS score of 8.2, this issue presents a high-level risk that should be addressed immediately.
Remediation
Immediate Action: Apply the vendor-supplied security patch to the Kados R10 GreenBee application.
Proactive Monitoring: Monitor database query logs for unexpected modification commands or unauthorized access to sensitive tables.
Compensating Controls: Implement WAF rules to inspect incoming traffic and block requests containing malicious SQL payloads in the 'id_to_modify' field.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Security teams must prioritize the application of vendor updates to remediate this SQL injection flaw. Failure to act may expose the organization to data integrity risks and potential regulatory non-compliance.