CVE-2019-25692

Infor · Kados R10 GreenBee

Kados R10 GreenBee is susceptible to SQL injection via the 'id_to_modify' parameter, allowing unauthorized database query manipulation.

Executive summary

The Kados R10 GreenBee platform suffers from an SQL injection vulnerability that could allow unauthorized modification or exfiltration of database records.

Vulnerability

This vulnerability occurs because the 'id_to_modify' parameter is not adequately sanitized before being used in database queries. This flaw allows an attacker to inject SQL commands, potentially altering database content.

Business impact

Exploitation of this vulnerability could lead to the unauthorized modification of critical business data, resulting in significant operational disruption and loss of data integrity. With a CVSS score of 8.2, this issue presents a high-level risk that should be addressed immediately.

Remediation

Immediate Action: Apply the vendor-supplied security patch to the Kados R10 GreenBee application.

Proactive Monitoring: Monitor database query logs for unexpected modification commands or unauthorized access to sensitive tables.

Compensating Controls: Implement WAF rules to inspect incoming traffic and block requests containing malicious SQL payloads in the 'id_to_modify' field.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Security teams must prioritize the application of vendor updates to remediate this SQL injection flaw. Failure to act may expose the organization to data integrity risks and potential regulatory non-compliance.