<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Open ISES — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/open-ises/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 18:21:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/open-ises/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open ISES Tickets Hardcoded Database Credentials Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-ises-hardcoded-credentials/</link><pubDate>Thu, 21 May 2026 18:21:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-ises-hardcoded-credentials/</guid><description>Open ISES Tickets before version 3.44.2 contains hardcoded MySQL database connection credentials in import_mdb.php, allowing unauthorized database access.</description><content:encoded><![CDATA[<p>Open ISES Tickets, a web-based ticketing system, suffers from a critical vulnerability (CVE-2026-48242) affecting versions prior to 3.44.2. The vulnerability stems from hardcoded MySQL database connection credentials (host, username, password, database name) within the <code>import_mdb.php</code> file. This file, and the credentials within it, were committed to the public code repository. As a result, anyone with access to the source code can potentially gain unauthorized access to the database server, leading to data breaches, modification, or complete system compromise. This exposure is particularly concerning given that deployed installations may be using the default, now-public, credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the Open ISES Tickets source code repository.</li>
<li>Attacker locates the <code>import_mdb.php</code> file within the repository.</li>
<li>Attacker extracts the hardcoded MySQL database connection credentials from <code>import_mdb.php</code>.</li>
<li>Attacker uses the obtained credentials to establish a connection to the MySQL database server.</li>
<li>Attacker authenticates to the database server using the compromised credentials.</li>
<li>Attacker executes arbitrary SQL queries to read sensitive data from the database.</li>
<li>Attacker may modify or delete data within the database, leading to data corruption or service disruption.</li>
<li>Attacker may escalate privileges within the database server and gain access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-48242 can lead to full compromise of the Open ISES Tickets system and its associated data. With a CVSS v3.1 score of 8.1, the vulnerability poses a significant risk. The exposure of database credentials allows attackers to read, modify, or delete sensitive information, potentially affecting all users of the ticketing system. The hardcoded nature of the credentials and public accessibility of the code repository significantly increase the likelihood of exploitation. The number of affected installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Open ISES Tickets version 3.44.2 or later to remove the hardcoded credentials.</li>
<li>Deploy the Sigma rule to detect potential database access attempts using default credentials.</li>
<li>Review the <code>import_mdb.php</code> file in existing installations and verify that the credentials have been changed from the default values.</li>
<li>Rotate database credentials for all Open ISES Tickets instances.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-48242</category><category>hardcoded-credentials</category><category>database-access</category></item><item><title>Open ISES Tickets Hardcoded MySQL Credentials Vulnerability (CVE-2026-48241)</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-ises-hardcoded-creds/</link><pubDate>Thu, 21 May 2026 18:20:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-ises-hardcoded-creds/</guid><description>Open ISES Tickets before version 3.44.2 contains hardcoded MySQL database credentials in loader.php, allowing an attacker with access to the source code or the file on a deployed installation to read the username, password, and database name and use them to connect to the database (CVE-2026-48241).</description><content:encoded><![CDATA[<p>Open ISES Tickets before version 3.44.2 is vulnerable to exposure of sensitive information via hardcoded credentials (CVE-2026-48241). The vulnerability exists in the <code>loader.php</code> file, a public-facing database utility where MySQL database credentials are hardcoded and committed to the source repository. An attacker with access to the public source tree (e.g., via public GitHub repository) or an unauthenticated attacker with read access to the file on a deployed installation can read the username, password, and database name. These credentials could be used to connect to the MySQL database if it is reachable from the attacker&rsquo;s network, leading to potential data breaches or other unauthorized activities. This vulnerability affects versions prior to 3.44.2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the Open ISES Tickets source code repository or a deployed installation.</li>
<li>Attacker locates the <code>loader.php</code> file.</li>
<li>Attacker reads the <code>loader.php</code> file.</li>
<li>Attacker extracts the hardcoded MySQL database username, password, and database name from the file.</li>
<li>Attacker uses the extracted credentials to attempt a connection to the MySQL database server.</li>
<li>If the database server is reachable from the attacker&rsquo;s network, the connection is established.</li>
<li>Attacker performs unauthorized actions on the database, such as data exfiltration, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain unauthorized access to the MySQL database used by Open ISES Tickets installations. This can lead to a full compromise of the data stored within the database, potentially including sensitive user information, ticket details, and other confidential data. The impact includes potential data breaches, financial loss due to regulatory fines, and reputational damage to the affected organization. The vulnerability affects all deployments of Open ISES Tickets prior to version 3.44.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Open ISES Tickets to version 3.44.2 or later to remediate CVE-2026-48241.</li>
<li>Implement the Sigma rule <code>Detect Open ISES Tickets loader.php Access</code> to detect unauthorized access to the vulnerable file.</li>
<li>Monitor network connections to the MySQL database server and alert on connections from unexpected or unauthorized IP addresses.</li>
<li>Review access controls to the Open ISES Tickets source code repository and deployed installations to ensure only authorized personnel have access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>hardcoded credentials</category><category>vulnerability</category><category>database</category></item><item><title>Open ISES Tickets SQL Injection Vulnerability (CVE-2026-48240)</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-ises-sql-injection/</link><pubDate>Thu, 21 May 2026 18:20:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-ises-sql-injection/</guid><description>Open ISES Tickets before version 3.44.2 is vulnerable to SQL injection in ajax/statistics.php via the tick_id and f_tick_id POST parameters, allowing authenticated attackers to manipulate SQL queries and potentially read, modify, or destroy database contents.</description><content:encoded><![CDATA[<p>Open ISES Tickets before version 3.44.2 is susceptible to a SQL injection vulnerability (CVE-2026-48240) within the <code>ajax/statistics.php</code> script. The vulnerability stems from the improper sanitization of the <code>tick_id</code> and <code>f_tick_id</code> POST parameters. These parameters are directly concatenated into the WHERE clauses of SELECT statements used in statistics rollup queries. An authenticated attacker can exploit this flaw by crafting malicious requests that alter the query&rsquo;s intended semantics, potentially enabling the unauthorized reading, modification, or deletion of sensitive data stored within the database. This issue was reported by VulnCheck and has a CVSS v3.1 base score of 7.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Open ISES Tickets application with valid credentials.</li>
<li>Attacker crafts a malicious HTTP POST request targeting <code>ajax/statistics.php</code>.</li>
<li>The POST request includes the <code>tick_id</code> or <code>f_tick_id</code> parameter containing a SQL injection payload.</li>
<li>The application unsafely concatenates the attacker-controlled parameters into the SQL query&rsquo;s WHERE clause.</li>
<li>The malicious SQL query executes against the database, potentially altering data selection, modification, or deletion.</li>
<li>The application returns a potentially modified or erroneous statistics rollup result based on the injected SQL.</li>
<li>Attacker analyzes the response to refine and escalate the SQL injection attack.</li>
<li>Attacker leverages the successful SQL injection to read sensitive database contents or perform unauthorized data manipulation, potentially compromising the entire application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-48240) could allow an attacker to read sensitive information from the Open ISES Tickets database, potentially including user credentials, ticket details, and other confidential data. The attacker may also be able to modify or delete data, leading to data corruption or denial of service. Given the high CVSS score of 7.1, this vulnerability poses a significant risk to the confidentiality and integrity of the application and its data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Open ISES Tickets to version 3.44.2 or later to patch CVE-2026-48240 (see References).</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts targeting the vulnerable <code>ajax/statistics.php</code> endpoint.</li>
<li>Implement input validation and sanitization for the <code>tick_id</code> and <code>f_tick_id</code> POST parameters in <code>ajax/statistics.php</code> to prevent SQL injection attacks.</li>
<li>Review and restrict database access privileges for the Open ISES Tickets application to minimize the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-48240</category><category>web-application</category></item><item><title>Open ISES Tickets SQL Injection Vulnerability (CVE-2026-48238)</title><link>https://feed.craftedsignal.io/briefs/2026-05-open-ises-tickets-sql-injection/</link><pubDate>Thu, 21 May 2026 18:20:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-open-ises-tickets-sql-injection/</guid><description>Open ISES Tickets before version 3.44.2 is vulnerable to SQL injection (CVE-2026-48238) because the id GET parameter in ajax/mobile_main.php is concatenated into the WHERE clause of a SELECT statement without sanitization, allowing authenticated attackers to craft requests that can read, modify, or destroy database contents.</description><content:encoded><![CDATA[<p>Open ISES Tickets before version 3.44.2 is susceptible to SQL injection in the ajax/mobile_main.php component. The vulnerability stems from the insecure handling of the <code>id</code> GET parameter. Specifically, this parameter is directly concatenated into the WHERE clause of a SELECT statement without proper sanitization or parameterization. This allows an authenticated attacker to manipulate the SQL query and potentially read, modify, or delete sensitive data within the database. This vulnerability was reported on 2026-05-21 and assigned CVE-2026-48238. Exploitation requires authentication, however, the impact can be significant, leading to data breaches or complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker identifies the vulnerable endpoint <code>ajax/mobile_main.php</code>.</li>
<li>The attacker crafts a malicious HTTP GET request targeting <code>ajax/mobile_main.php</code>.</li>
<li>The crafted GET request includes the <code>id</code> parameter with a SQL injection payload.</li>
<li>The server-side application concatenates the unsanitized <code>id</code> parameter into the SQL query.</li>
<li>The malicious SQL query is executed against the database.</li>
<li>The attacker can read sensitive data from the database by using <code>UNION SELECT</code> to extract data from other tables.</li>
<li>Alternatively, the attacker modifies data using <code>UPDATE</code> statements within the injected SQL.</li>
<li>The attacker can potentially gain full control over the application data, leading to complete compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-48238) can allow an attacker to read, modify, or destroy data within the Open ISES Tickets database. This can lead to sensitive information disclosure, data corruption, or denial of service. Given a CVSS base score of 7.1, the risk is considerable, especially if the targeted Open ISES Tickets instance contains sensitive information or is critical to business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Open ISES Tickets to version 3.44.2 or later to patch the SQL injection vulnerability (CVE-2026-48238) as recommended by the vendor.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts in Open ISES Tickets</code> to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious GET requests to <code>ajax/mobile_main.php</code> containing SQL injection payloads, specifically looking for SQL keywords or syntax in the <code>id</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>sql-injection</category><category>web-application</category></item></channel></rss>