Skip to main content

CVE-2019-25159: CWE-89 SQL Injection in mpedraza2020 Intranet del Monterroso

Medium
VulnerabilityCVE-2019-25159cvecve-2019-25159cwe-89
Published: Sun Feb 04 2024 (02/04/2024, 06:00:06 UTC)
Source: CVE
Vendor/Project: mpedraza2020
Product: Intranet del Monterroso

Description

A vulnerability was found in mpedraza2020 Intranet del Monterroso up to 4.50.0. It has been classified as critical. This affects an unknown part of the file config/cargos.php. The manipulation of the argument dni_profe leads to sql injection. Upgrading to version 4.51.0 is able to address this issue. The identifier of the patch is 678190bee1dfd64b54a2b0e88abfd009e78adce8. It is recommended to upgrade the affected component. The identifier VDB-252717 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:39:31 UTC

Technical Analysis

CVE-2019-25159 is a SQL Injection vulnerability identified in the mpedraza2020 Intranet del Monterroso software, affecting all versions up to 4.50.0. The vulnerability exists in the config/cargos.php file, specifically through the manipulation of the 'dni_profe' parameter. An attacker can exploit this flaw by injecting malicious SQL code via this parameter, which is not properly sanitized or validated before being used in database queries. This can lead to unauthorized access to or modification of the backend database, potentially exposing sensitive information or allowing data corruption. The vulnerability has been assigned a CVSS 3.1 base score of 5.5, indicating a medium severity level. The vector string (AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) shows that the attack requires adjacent network access (e.g., VPN or internal network), low attack complexity, and low privileges but no user interaction. The impact affects confidentiality, integrity, and availability at a low level. The vendor has addressed the issue in version 4.51.0, and upgrading to this version or later is recommended to remediate the vulnerability. No known exploits are currently reported in the wild, but the presence of a SQL injection vulnerability in an intranet system poses a significant risk if exploited.

Potential Impact

For European organizations using the mpedraza2020 Intranet del Monterroso software, this vulnerability could lead to unauthorized disclosure of internal data, modification of sensitive records, or disruption of intranet services. Since the intranet likely contains employee, operational, or organizational data, exploitation could result in data breaches, loss of data integrity, and potential operational downtime. The requirement for adjacent network access limits remote exploitation but does not eliminate risk, especially in environments with weak internal network segmentation or where VPN access is granted to external users. The medium severity rating suggests moderate risk; however, given the critical nature of intranet systems in business operations, the impact could be amplified if attackers leverage this vulnerability as a foothold for further lateral movement or privilege escalation within the network.

Mitigation Recommendations

European organizations should prioritize upgrading the mpedraza2020 Intranet del Monterroso software to version 4.51.0 or later to apply the official patch. Beyond patching, organizations should implement strict network segmentation to limit access to the intranet system only to authorized users and devices. Employing Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities can provide an additional layer of defense. Regularly audit and sanitize all user inputs, especially parameters like 'dni_profe', to ensure no unsanitized data reaches the database layer. Conduct internal penetration testing focusing on SQL injection vectors to identify any residual vulnerabilities. Finally, monitor database logs and application logs for unusual query patterns or errors that might indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-02-02T13:41:43.602Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec2f8

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:39:31 PM

Last updated: 8/16/2025, 5:39:21 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats