<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25643 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25643/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:16:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25643/feed.xml" rel="self" type="application/rss+xml"/><item><title>eNdonesia Portal v8.7 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-endonesia-sql-injection/</link><pubDate>Tue, 24 Mar 2026 12:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-endonesia-sql-injection/</guid><description>eNdonesia Portal v8.7 is vulnerable to SQL injection allowing unauthenticated attackers to execute arbitrary SQL queries via the bid parameter in banners.php, potentially leading to sensitive data extraction.</description><content:encoded><![CDATA[<p>eNdonesia Portal v8.7 is susceptible to SQL injection vulnerabilities. Unauthenticated attackers can exploit this flaw by injecting malicious SQL code through the <code>bid</code> parameter in the <code>banners.php</code> script. The vulnerability allows attackers to execute arbitrary SQL queries against the application&rsquo;s database. Successful exploitation could lead to the unauthorized extraction of sensitive information, including database schema details from <code>INFORMATION_SCHEMA</code> tables. This vulnerability, identified as CVE-2019-25643, poses a significant risk due to the ease of exploitation and the potential for extensive data compromise. The vulnerability was reported on March 24, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an eNdonesia Portal v8.7 instance.</li>
<li>The attacker crafts a malicious SQL payload designed to extract data from the <code>INFORMATION_SCHEMA</code> tables.</li>
<li>The attacker constructs a GET request targeting <code>banners.php</code>.</li>
<li>The crafted SQL payload is injected into the <code>bid</code> parameter of the GET request: <code>banners.php?bid=&lt;SQL_payload&gt;</code>.</li>
<li>The web server processes the request and executes the injected SQL query against the database.</li>
<li>The database returns the results of the SQL query, potentially including sensitive data or schema information.</li>
<li>The attacker receives the database response containing the extracted information.</li>
<li>The attacker analyzes the extracted information to further compromise the system or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the unauthorized disclosure of sensitive data, including user credentials, financial information, and other confidential data stored in the eNdonesia Portal v8.7 database. The impact could range from defacement of the website to complete compromise of the underlying database server. Although the number of affected installations is unknown, any instance of eNdonesia Portal v8.7 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting eNdonesia banners.php SQL Injection Attempt</code> to your SIEM to identify exploitation attempts targeting the <code>banners.php</code> endpoint.</li>
<li>Examine web server logs for GET requests to <code>banners.php</code> containing suspicious SQL syntax within the <code>bid</code> parameter (reference the log source in the Sigma rule).</li>
<li>Apply available patches or updates for eNdonesia Portal v8.7 to remediate the CVE-2019-25643 vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25643</category></item></channel></rss>