MyT-PM 1.5.1 SQL Injection Vulnerability
MyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.
MyT-PM 1.5.1 is susceptible to an SQL injection vulnerability (CVE-2019-25713) that enables authenticated attackers to execute arbitrary SQL queries. This vulnerability exists due to insufficient input sanitization of the Charge[group_total] parameter. By sending specially crafted POST requests to the /charge/admin endpoint, an attacker can inject malicious SQL code, potentially leading to sensitive data extraction, data manipulation, or other unauthorized actions. This vulnerability poses a significant risk to organizations using MyT-PM 1.5.1 as it could compromise the integrity and confidentiality of their data.
Attack Chain
- An attacker authenticates to the MyT-PM 1.5.1 application.
- The attacker crafts a malicious POST request targeting the
/charge/adminendpoint. - Within the POST request, the attacker injects SQL code into the
Charge[group_total]parameter. - The application processes the request without properly sanitizing the
Charge[group_total]parameter. - The injected SQL code is executed against the underlying database.
- The attacker leverages the SQL injection to extract sensitive data (e.g., user credentials, financial information) using error-based, time-based blind, or stacked query payloads.
- The attacker may further manipulate data within the database, potentially altering records or creating new entries.
- The attacker achieves complete control over the database, potentially leading to full system compromise.
Impact
Successful exploitation of this SQL injection vulnerability can lead to the unauthorized disclosure of sensitive information, such as user credentials, financial records, and other confidential data stored within the MyT-PM database. Attackers may also be able to modify or delete data, leading to data integrity issues and potential disruption of business operations. This could result in financial losses, reputational damage, and legal repercussions for affected organizations.
Recommendation
- Apply patches or upgrade to a secure version of MyT-PM that addresses CVE-2019-25713.
- Deploy the provided Sigma rule to detect potentially malicious requests containing SQL injection attempts targeting the
/charge/adminendpoint and theCharge[group_total]parameter. - Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in MyT-PM and other web applications.
- Monitor web server logs for suspicious POST requests to
/charge/adminwith unusual characters or SQL keywords in theCharge[group_total]parameter.
Detection coverage 2
Detect SQL Injection Attempts in MyT-PM Charge Endpoint
highDetects potential SQL injection attempts targeting the /charge/admin endpoint in MyT-PM through the Charge[group_total] parameter.
Detect SQL Injection UNION SELECT
highDetects UNION SELECT strings in web requests, indicating possible SQL injection attempts.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
4
url
| Type | Value |
|---|---|
| url | https://manageyourteam.net/ |
| url | https://sourceforge.net/projects/myt/ |
| url | https://www.exploit-db.com/exploits/46084 |
| url | https://www.vulncheck.com/advisories/myt-pm-sql-injection-via-charge-group-total-parameter |