C4G Basic Laboratory Information System 3.4 SQL Injection Vulnerability
C4G Basic Laboratory Information System 3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL commands via the 'site' parameter in GET requests to the users_select.php endpoint, potentially leading to sensitive data extraction.
C4G Basic Laboratory Information System version 3.4 is susceptible to SQL injection vulnerabilities. The vulnerability allows unauthenticated attackers to inject malicious SQL code through the site parameter in HTTP GET requests targeting the users_select.php endpoint. Successful exploitation could grant attackers unauthorized access to sensitive data stored within the system’s database, including confidential patient records and system credentials. This vulnerability poses a significant threat to organizations utilizing the affected LIS, as it may lead to data breaches, compliance violations, and potential compromise of the entire system. Public exploits are available, increasing the risk of widespread exploitation.
Attack Chain
- The attacker identifies a vulnerable C4G Basic Laboratory Information System 3.4 instance.
- The attacker crafts a malicious SQL injection payload designed to extract data or execute commands.
- The attacker sends an HTTP GET request to the
users_select.phpendpoint with the crafted SQL payload injected into thesiteparameter. - The vulnerable application processes the malicious SQL query without proper sanitization.
- The database executes the injected SQL commands, potentially returning sensitive data.
- The attacker receives the database response containing the extracted information or the results of the executed commands.
- The attacker uses the extracted information, such as user credentials or patient data, for further malicious activities.
Impact
Successful exploitation of this SQL injection vulnerability allows unauthorized access to sensitive data stored within the C4G Basic Laboratory Information System 3.4 database. This includes patient records, system credentials, and potentially other confidential information. The impact can range from data breaches and privacy violations to complete system compromise, depending on the privileges of the database user and the extent of the attacker’s knowledge.
Recommendation
- Apply any available patches or updates for C4G Basic Laboratory Information System 3.4 to remediate the SQL injection vulnerability described in CVE-2019-25678.
- Deploy the Sigma rule
Detect SQL Injection Attempt in C4G Basic LISto identify potential exploitation attempts against theusers_select.phpendpoint. - Implement input validation and sanitization measures to prevent SQL injection attacks against web applications.
Detection coverage 2
Detect SQL Injection Attempt in C4G Basic LIS
highDetects potential SQL injection attempts targeting the users_select.php endpoint of C4G Basic Laboratory Information System.
Detect SQL Injection via GET Request to users_select.php
highThis rule detects potential SQL injection attacks by monitoring GET requests to 'users_select.php' with suspicious characters in the query parameters.
Detection queries are kept inside the platform. Get full rules →