<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Oinone — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/oinone/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 06:16:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/oinone/feed.xml" rel="self" type="application/rss+xml"/><item><title>Oinone Pamirs SQL Injection Vulnerability (CVE-2026-8734)</title><link>https://feed.craftedsignal.io/briefs/2026-05-oinone-pamirs-sqli/</link><pubDate>Sun, 17 May 2026 06:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-oinone-pamirs-sqli/</guid><description>Oinone Pamirs up to version 7.2.0 is vulnerable to SQL injection in the RSQLToSQLNodeConnector.makeVariable function of the queryListByWrapper Interface, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>Oinone Pamirs, up to version 7.2.0, is susceptible to SQL injection (CVE-2026-8734) within the <code>RSQLToSQLNodeConnector.makeVariable</code> function of the <code>queryListByWrapper</code> interface. This vulnerability enables a remote attacker to inject and execute arbitrary SQL commands by manipulating input to this function.  The vulnerability has a CVSS v3.1 base score of 7.3, indicating a high severity. Public exploits targeting this flaw have been disclosed, increasing the risk of exploitation. The vendor was notified of the vulnerability but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an Oinone Pamirs instance running a version equal to or below 7.2.0 with the vulnerable <code>queryListByWrapper</code> interface exposed.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>queryListByWrapper</code> interface.</li>
<li>The request includes specially crafted input designed to inject SQL commands into the <code>RSQLToSQLNodeConnector.makeVariable</code> function.</li>
<li>The application processes the malicious input without proper sanitization.</li>
<li>The injected SQL commands are executed against the underlying database.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database.</li>
<li>The attacker may modify or delete data, potentially leading to data corruption or denial of service.</li>
<li>The attacker could potentially use the database as a pivot point to compromise other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-8734) can lead to unauthorized access to sensitive information, data manipulation, and potential compromise of the underlying database server. Given the presence of publicly available exploits, organizations using vulnerable versions of Oinone Pamirs are at significant risk. The impact could range from data breaches and financial loss to reputational damage and disruption of services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to mitigate SQL injection vulnerabilities, referencing CWE-89.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2026-8734 Exploitation — SQL Injection in Oinone Pamirs</code> to identify potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>queryListByWrapper</code> interface (logsource: webserver).</li>
<li>Review and restrict database access privileges to minimize the impact of potential SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql injection</category><category>cve-2026-8734</category><category>web application</category></item></channel></rss>