<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25662 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25662/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 05 Apr 2026 21:16:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25662/feed.xml" rel="self" type="application/rss+xml"/><item><title>ResourceSpace 8.6 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-resourcespace-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-resourcespace-sqli/</guid><description>ResourceSpace 8.6 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL queries via the 'ref' parameter in GET requests to the watched_searches.php endpoint, leading to sensitive data extraction.</description><content:encoded><![CDATA[<p>ResourceSpace 8.6 is susceptible to a critical SQL injection vulnerability (CVE-2019-25662) that allows unauthenticated attackers to execute arbitrary SQL queries. The vulnerability is located within the watched_searches.php endpoint and is triggered through the &lsquo;ref&rsquo; parameter in GET requests. By injecting malicious SQL code into this parameter, attackers can bypass authentication and directly interact with the database, potentially extracting sensitive information such as usernames and credentials. This vulnerability poses a significant risk as it does not require any prior authentication, making exploitation straightforward for remote attackers. ResourceSpace is an open-source digital asset management (DAM) system. Successful exploitation of this vulnerability allows attackers to potentially compromise the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a ResourceSpace 8.6 instance.</li>
<li>The attacker crafts a malicious SQL injection payload designed to extract data or manipulate the database. This payload is injected into the &lsquo;ref&rsquo; parameter.</li>
<li>The attacker sends a GET request to the <code>/watched_searches.php</code> endpoint with the crafted SQL payload within the <code>ref</code> parameter (e.g., <code>watched_searches.php?ref=SQL_injection_payload</code>).</li>
<li>The ResourceSpace application improperly processes the attacker-supplied SQL payload without proper sanitization.</li>
<li>The malicious SQL query is executed against the underlying database.</li>
<li>The database server processes the query and returns the results to the ResourceSpace application.</li>
<li>The ResourceSpace application displays the results, which may include sensitive information like usernames, passwords, or other confidential data.</li>
<li>The attacker retrieves the extracted sensitive data from the application&rsquo;s response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability in ResourceSpace 8.6 can lead to the complete compromise of the affected system. Attackers can gain unauthorized access to sensitive data, including user credentials, financial information, and proprietary data. This could lead to financial loss, reputational damage, and legal liabilities. Given the nature of digital asset management systems, the compromised data might include valuable intellectual property or personally identifiable information (PII), potentially impacting a large number of individuals.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of ResourceSpace to remediate CVE-2019-25662.</li>
<li>Deploy the Sigma rule <code>Detect ResourceSpace SQL Injection Attempt</code> to monitor for exploitation attempts against the <code>/watched_searches.php</code> endpoint.</li>
<li>Implement input validation and sanitization on the &lsquo;ref&rsquo; parameter within the <code>watched_searches.php</code> endpoint to prevent SQL injection.</li>
<li>Enable web server logging and monitor for suspicious GET requests to <code>watched_searches.php</code> containing unusual characters or SQL keywords.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25662</category><category>resourcespace</category></item></channel></rss>