CVE-2019-25704

Infor · Kados R10 GreenBee

Kados R10 GreenBee is susceptible to SQL injection via the filter_user_mail parameter, allowing unauthorized database query manipulation.

Executive summary

The Kados R10 GreenBee application contains an SQL injection vulnerability that could lead to unauthorized database access and data compromise.

Vulnerability

The filter_user_mail parameter is not properly sanitized, allowing attackers to inject malicious SQL commands into the application's database queries.

Business impact

Successful exploitation could result in unauthorized access to sensitive data, leading to a significant breach. The CVSS score of 8.2 signifies a high-severity threat that requires immediate intervention from security teams.

Remediation

Immediate Action: Apply the vendor-provided security patch to the affected system.

Proactive Monitoring: Review database and application logs for unusual query activity that might indicate an injection attempt.

Compensating Controls: Deploy WAF rules to detect and block SQL injection patterns in the filter_user_mail parameter.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Security teams must prioritize patching this vulnerability to ensure the integrity of the system's data. Immediate action is required to reduce the risk of unauthorized database interaction.