CVE-2019-25702

Infor · Kados R10 GreenBee

Kados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries.

Executive summary

An SQL injection vulnerability in Infor Kados R10 GreenBee enables unauthorized database manipulation, posing a significant security risk.

Vulnerability

This vulnerability exists because the id_project parameter is not properly sanitized, allowing attackers to inject SQL commands into the backend database.

Business impact

Unauthorized database interaction could lead to data theft or system compromise, causing significant harm to business operations. The CVSS score of 8.2 highlights the severity of this issue and the importance of timely remediation.

Remediation

Immediate Action: Update the Kados R10 GreenBee software to the latest version provided by the vendor.

Proactive Monitoring: Monitor database query logs for suspicious activity and unauthorized access attempts.

Compensating Controls: Use a Web Application Firewall (WAF) to filter out malicious SQL injection attempts targeting the id_project parameter.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations should ensure that all security updates are applied immediately. Implementing strong database access controls and monitoring will help mitigate the potential for exploitation.