ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability
ASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.
ASP.NET jVideo Kit 1.0 is susceptible to an SQL injection vulnerability (CVE-2018-25205) affecting its search functionality. This vulnerability enables unauthenticated attackers to inject arbitrary SQL commands by manipulating the ‘query’ parameter. The attack can be carried out via both GET and POST requests directed towards the /search endpoint. Successful exploitation allows attackers to perform boolean-based blind or error-based SQL injection techniques, potentially leading to the extraction of sensitive database information. This vulnerability was published on March 26, 2026. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized access to sensitive data.
Attack Chain
- An unauthenticated attacker identifies an ASP.NET jVideo Kit 1.0 instance.
- The attacker crafts a malicious SQL payload designed to exploit the ‘query’ parameter in the
/searchendpoint. - The attacker sends a GET or POST request to the
/searchendpoint with the crafted SQL payload embedded in thequeryparameter. - The ASP.NET application fails to properly sanitize the input from the
queryparameter before using it in a database query. - The malicious SQL payload is executed against the database.
- Depending on the SQL injection technique (boolean-based blind, error-based), the attacker infers information about the database structure and data.
- The attacker refines the SQL payloads to extract sensitive data, such as usernames, passwords, or other confidential information.
- The attacker exfiltrates the extracted data for malicious purposes.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2018-25205) allows unauthenticated attackers to extract sensitive information from the affected ASP.NET jVideo Kit 1.0 database. The number of affected installations is unknown, but the vulnerability could lead to data breaches, compromise of user accounts, and potential reputational damage to organizations using the vulnerable software. The affected software is a video sharing script, making content websites a key target.
Recommendation
- Apply available patches or updates for ASP.NET jVideo Kit 1.0 to address CVE-2018-25205.
- Implement input validation and sanitization measures to prevent SQL injection attacks against the
/searchendpoint, focusing on the ‘query’ parameter. - Deploy the following Sigma rule to detect exploitation attempts targeting the
/searchendpoint with potentially malicious SQL queries.
Detection coverage 2
Detect SQL Injection Attempts in jVideo Kit Search
highDetects potential SQL injection attempts targeting the /search endpoint in ASP.NET jVideo Kit 1.0 by looking for common SQL injection keywords in the query parameter.
Detect SQL Injection Error Responses
mediumDetects potential SQL injection attempts by monitoring web server logs for specific error status codes and messages associated with SQL errors after a request to /search
Detection queries are kept inside the platform. Get full rules →