CVE-2019-25698

Infor · Kados R10 GreenBee

Kados R10 GreenBee contains an SQL injection vulnerability in the id_to_delete parameter, enabling unauthorized database query manipulation.

Executive summary

The Kados R10 GreenBee application is vulnerable to SQL injection, which could allow an attacker to maliciously modify or delete database records.

Vulnerability

The id_to_delete parameter is not properly sanitized, allowing attackers to inject SQL commands into the application's database queries. This vulnerability allows for unauthorized data manipulation.

Business impact

Successful exploitation could result in the loss of data or unauthorized access to system records, leading to significant disruption. The CVSS score of 8.2 indicates a high-severity threat that requires immediate attention from security teams.

Remediation

Immediate Action: Update the Kados R10 GreenBee software to the latest version as directed by the vendor.

Proactive Monitoring: Review database logs for suspicious delete or modification commands that do not align with standard user behavior.

Compensating Controls: Use a Web Application Firewall (WAF) to detect and block malicious SQL injection strings in the id_to_delete parameter.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Prompt remediation is necessary to ensure the integrity of the application's database. IT administrators should verify that all patches are applied to eliminate the risk of exploitation.