<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-28805 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-28805/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 14:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-28805/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenSTAManager Time-Based Blind SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openstamanager-sqli/</link><pubDate>Thu, 02 Apr 2026 14:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openstamanager-sqli/</guid><description>OpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>OpenSTAManager, a management software for technical assistance and invoicing, contains a critical vulnerability that could lead to significant data breaches. Specifically, versions prior to 2.10.2 are vulnerable to Time-Based Blind SQL Injection (CVE-2026-28805) in its AJAX select handlers. The vulnerability exists due to the lack of sanitization, parameterization, or allowlist validation of the &lsquo;options[stato]&rsquo; GET parameter. This allows an authenticated attacker to inject arbitrary SQL queries, potentially compromising the entire database. Successful exploitation allows an attacker to extract sensitive data like usernames, password hashes, and financial records. Organizations using affected versions of OpenSTAManager should upgrade to version 2.10.2 immediately to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker identifies the vulnerable AJAX select handler within the OpenSTAManager application.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the vulnerable endpoint, injecting SQL code into the <code>options[stato]</code> parameter (e.g., <code>options[stato]=%' AND SLEEP(5) AND '%'='</code>).</li>
<li>The server-side application concatenates the attacker-supplied SQL code directly into a SQL WHERE clause without proper sanitization.</li>
<li>The injected SQL <code>SLEEP()</code> function causes a time delay on the server, confirming the successful injection to the attacker.</li>
<li>The attacker refines the SQL injection payload to extract specific data, such as the database version or user credentials, using conditional <code>SLEEP()</code> statements and character-by-character extraction techniques.</li>
<li>The attacker iterates through the database structure and tables, extracting sensitive data like usernames and password hashes.</li>
<li>Using the extracted credentials, the attacker gains unauthorized access to administrative functions within OpenSTAManager.</li>
<li>The attacker exfiltrates financial records and other sensitive data from the compromised database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the OpenSTAManager database. This includes the potential exposure of sensitive customer data, financial records, and internal user credentials. The impact could range from financial loss and reputational damage to legal repercussions for failing to protect sensitive information. Given the CVSS v3.1 base score of 8.8, this is a critical vulnerability requiring immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenSTAManager to version 2.10.2 or later to patch CVE-2026-28805.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenSTAManager SQL Injection Attempt&rdquo; to monitor for malicious requests containing SQL injection payloads targeting the <code>options[stato]</code> parameter (see rules).</li>
<li>Implement web application firewall (WAF) rules to block requests containing SQL injection patterns, specifically targeting the <code>options[stato]</code> GET parameter.</li>
<li>Review web server logs for unusual activity and suspicious requests containing SQL syntax within the <code>options[stato]</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openstamanager</category><category>sqli</category><category>cve-2026-28805</category></item></channel></rss>