<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25713 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25713/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 13:16:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25713/feed.xml" rel="self" type="application/rss+xml"/><item><title>MyT-PM 1.5.1 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mytpm-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mytpm-sqli/</guid><description>MyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.</description><content:encoded><![CDATA[<p>MyT-PM 1.5.1 is susceptible to an SQL injection vulnerability (CVE-2019-25713) that enables authenticated attackers to execute arbitrary SQL queries. This vulnerability exists due to insufficient input sanitization of the <code>Charge[group_total]</code> parameter. By sending specially crafted POST requests to the <code>/charge/admin</code> endpoint, an attacker can inject malicious SQL code, potentially leading to sensitive data extraction, data manipulation, or other unauthorized actions. This vulnerability poses a significant risk to organizations using MyT-PM 1.5.1 as it could compromise the integrity and confidentiality of their data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the MyT-PM 1.5.1 application.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/charge/admin</code> endpoint.</li>
<li>Within the POST request, the attacker injects SQL code into the <code>Charge[group_total]</code> parameter.</li>
<li>The application processes the request without properly sanitizing the <code>Charge[group_total]</code> parameter.</li>
<li>The injected SQL code is executed against the underlying database.</li>
<li>The attacker leverages the SQL injection to extract sensitive data (e.g., user credentials, financial information) using error-based, time-based blind, or stacked query payloads.</li>
<li>The attacker may further manipulate data within the database, potentially altering records or creating new entries.</li>
<li>The attacker achieves complete control over the database, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the unauthorized disclosure of sensitive information, such as user credentials, financial records, and other confidential data stored within the MyT-PM database. Attackers may also be able to modify or delete data, leading to data integrity issues and potential disruption of business operations. This could result in financial losses, reputational damage, and legal repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a secure version of MyT-PM that addresses CVE-2019-25713.</li>
<li>Deploy the provided Sigma rule to detect potentially malicious requests containing SQL injection attempts targeting the <code>/charge/admin</code> endpoint and the <code>Charge[group_total]</code> parameter.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in MyT-PM and other web applications.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/charge/admin</code> with unusual characters or SQL keywords in the <code>Charge[group_total]</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25713</category></item></channel></rss>