OpenDocMan 1.3.4 SQL Injection Vulnerability
OpenDocMan version 1.3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries via the 'where' parameter in search.php to extract sensitive information.
OpenDocMan 1.3.4 is susceptible to SQL injection attacks due to insufficient input validation. An unauthenticated attacker can inject malicious SQL code into the ‘where’ parameter of the search.php endpoint. This vulnerability allows attackers to bypass normal query restrictions, potentially leading to the extraction of sensitive data from the database. The vulnerability was published on 2026-04-05 and assigned CVE-2019-25684. Successful exploitation grants attackers unauthorized access to database contents without requiring authentication.
Attack Chain
- The attacker identifies an OpenDocMan 1.3.4 instance.
- The attacker crafts a malicious HTTP GET request targeting the
/search.phpendpoint. - The attacker injects SQL code into the
whereparameter of the GET request. - The web server passes the crafted SQL query to the database without proper sanitization.
- The database executes the injected SQL code, potentially returning sensitive data.
- The attacker receives the database response containing the extracted information.
- The attacker analyzes the extracted data for sensitive information such as usernames, passwords, or confidential documents.
Impact
Successful exploitation of this SQL injection vulnerability can lead to the complete compromise of the OpenDocMan database. An attacker can access sensitive information, including user credentials and confidential documents, potentially impacting all users of the affected OpenDocMan instance. There are no specific details about victim counts or targeted sectors available, but the impact could be widespread, depending on the deployment of OpenDocMan.
Recommendation
- Apply input validation and sanitization to the
whereparameter insearch.phpto prevent SQL injection. - Deploy the Sigma rule to detect attempts to exploit CVE-2019-25684 by monitoring for suspicious SQL syntax in the ‘where’ parameter within web server logs.
- Upgrade to a patched version of OpenDocMan that addresses this vulnerability when available.
- Monitor web server logs for unusual activity targeting the
search.phpendpoint, as indicated in the attack chain.
Detection coverage 2
Detect SQL Injection Attempt in OpenDocMan search.php
highDetects potential SQL injection attempts by looking for specific SQL keywords in the 'where' parameter of requests to search.php in OpenDocMan.
Detect OpenDocMan SQL Injection via GET Request to search.php
mediumThis rule detects GET requests to search.php with a 'where' parameter that contains SQL keywords indicative of an injection attempt.
Detection queries are kept inside the platform. Get full rules →