<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Edirectory — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/edirectory/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 05 Apr 2026 21:16:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/edirectory/feed.xml" rel="self" type="application/rss+xml"/><item><title>eDirectory SQL Injection Vulnerability (CVE-2019-25675)</title><link>https://feed.craftedsignal.io/briefs/2026-04-edirectory-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-edirectory-sqli/</guid><description>Unauthenticated attackers can exploit SQL injection vulnerabilities in eDirectory (CVE-2019-25675) to bypass administrator authentication and disclose sensitive files.</description><content:encoded><![CDATA[<p>CVE-2019-25675 describes multiple SQL injection vulnerabilities affecting eDirectory. An unauthenticated attacker can exploit these vulnerabilities to bypass administrator authentication and disclose sensitive files. The vulnerability lies in the <code>key</code> parameter of the login endpoint. By injecting SQL code, specifically a UNION-based SQL injection, an attacker can authenticate as an administrator. After successful authentication, the attacker can then exploit file disclosure vulnerabilities in the <code>language_file.php</code> script to read arbitrary PHP files from the server, potentially exposing sensitive configuration data or credentials. This vulnerability poses a significant risk as it allows unauthorized access and data exfiltration without requiring any prior authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the login endpoint of eDirectory.</li>
<li>The attacker injects SQL code into the <code>key</code> parameter within the request, using a UNION-based SQL injection technique.</li>
<li>The eDirectory server improperly processes the SQL injection, allowing the attacker to bypass authentication and gain administrator privileges.</li>
<li>The attacker, now authenticated as an administrator, sends a request to the <code>language_file.php</code> script.</li>
<li>The attacker exploits a file disclosure vulnerability in the <code>language_file.php</code> script by manipulating input parameters.</li>
<li>The server, due to the vulnerability, reads the arbitrary PHP file specified by the attacker.</li>
<li>The server returns the contents of the requested PHP file to the attacker.</li>
<li>The attacker analyzes the disclosed PHP file, potentially revealing sensitive information such as database credentials or configuration details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2019-25675 allows unauthenticated attackers to gain complete control over the affected eDirectory instance. This can lead to the exfiltration of sensitive data, including user credentials and configuration information. While the specific number of victims is not stated, the potential impact is high considering the widespread use of eDirectory in various sectors. A successful attack could compromise the confidentiality and integrity of critical systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for eDirectory to address the SQL injection vulnerabilities described in CVE-2019-25675.</li>
<li>Deploy the Sigma rule <code>Detect eDirectory language_file.php File Disclosure</code> to detect attempts to exploit the file disclosure vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect eDirectory SQL Injection Attempt</code> to detect SQL injection attempts against the login endpoint.</li>
<li>Monitor web server logs for suspicious requests to the login endpoint (<code>/login</code>) and <code>language_file.php</code> to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>edirectory</category><category>cve-2019-25675</category></item></channel></rss>