Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability
A SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.
A SQL injection vulnerability has been identified in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform version 1.3.0. The vulnerability resides within the /SubstationWEBV2/main/elecMaxMinAvgValue file and is triggered by manipulating the fCircuitids argument. This flaw allows remote attackers to inject arbitrary SQL commands, potentially leading to unauthorized data access, modification, or complete system compromise. The vendor was notified about the vulnerability but did not provide a response. Given the publicly disclosed nature of the exploit, organizations using the affected software should take immediate steps to mitigate the risk.
Attack Chain
- The attacker identifies an instance of Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 accessible over the network.
- The attacker crafts a malicious HTTP request targeting the
/SubstationWEBV2/main/elecMaxMinAvgValueendpoint. - Within the request, the attacker injects SQL code into the
fCircuitidsparameter. - The application improperly sanitizes the input, passing the malicious SQL code to the database.
- The database executes the injected SQL code.
- The attacker is able to retrieve sensitive data from the database, such as user credentials or system configurations.
- The attacker uses the stolen credentials to gain unauthorized access to other parts of the application.
- The attacker gains complete control of the application server, potentially leading to further compromise of the network.
Impact
Successful exploitation of this SQL injection vulnerability could allow attackers to access and modify sensitive data, potentially disrupting power operation and maintenance processes. Given that the software is used for enterprise power management, this could lead to significant financial losses, reputational damage, and potential safety hazards. The number of victims is currently unknown, but any organization utilizing the affected software (version 1.3.0 of Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform) is potentially at risk.
Recommendation
- Inspect web server logs for suspicious requests to
/SubstationWEBV2/main/elecMaxMinAvgValuecontaining unusual characters or SQL keywords in thefCircuitidsparameter to detect potential exploitation attempts. - Deploy the Sigma rule
Detect Suspicious fCircuitids Parameter Manipulationto identify potentially malicious requests targeting the vulnerable endpoint. - Implement input validation and sanitization measures on the
fCircuitidsparameter to prevent SQL injection attacks. - Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting the vulnerable endpoint.
Detection coverage 2
Detect Suspicious fCircuitids Parameter Manipulation
highDetects suspicious requests to the elecMaxMinAvgValue endpoint with potentially malicious SQL injection attempts in the fCircuitids parameter.
Detect Suspicious URL Encoding in fCircuitids Parameter
mediumDetects suspicious URL encoded SQL injection attempts in the fCircuitids parameter.
Detection queries are kept inside the platform. Get full rules →