Skip to main content

CVE-2022-42744: SQL injection in CandidATS

Critical
VulnerabilityCVE-2022-42744cvecve-2022-42744
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: CandidATS

Description

CandidATS version 3.0.0 allows an external attacker to perform CRUD operations on the application databases. This is possible because the application does not correctly validate the entriesPerPage parameter against SQLi attacks.

AI-Powered Analysis

AILast updated: 07/03/2025, 13:58:38 UTC

Technical Analysis

CVE-2022-42744 is a critical SQL injection vulnerability affecting CandidATS version 3.0.0. The vulnerability arises because the application fails to properly validate the 'entriesPerPage' parameter, allowing an unauthenticated remote attacker to inject malicious SQL code. This flaw enables attackers to perform Create, Read, Update, and Delete (CRUD) operations directly on the application's backend databases. Given the nature of SQL injection (CWE-89), attackers can manipulate database queries to extract sensitive data, modify or delete records, and potentially escalate their privileges within the system. The CVSS score of 9.8 (critical) reflects the high impact and ease of exploitation: the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's severity and straightforward exploitation path make it a significant risk. The lack of patches or mitigations from the vendor further exacerbates the threat, leaving systems running CandidATS 3.0.0 exposed to potential compromise.

Potential Impact

For European organizations using CandidATS 3.0.0, this vulnerability poses a severe risk to data confidentiality, integrity, and availability. CandidATS is typically used for applicant tracking and recruitment management, meaning compromised databases could expose sensitive personal data of candidates and employees, violating GDPR and other data protection regulations. Unauthorized modification or deletion of recruitment data could disrupt HR operations, leading to operational downtime and reputational damage. The ability to perform CRUD operations remotely without authentication increases the likelihood of exploitation by cybercriminals or state-sponsored actors targeting European entities. Additionally, compromised systems could be leveraged as pivot points for lateral movement within corporate networks, amplifying the overall security risk. The absence of known exploits does not diminish the urgency, as the vulnerability's characteristics make it an attractive target for attackers.

Mitigation Recommendations

Immediate mitigation steps include: 1) Disabling or restricting external access to CandidATS 3.0.0 instances until a patch or update is available. 2) Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'entriesPerPage' parameter. 3) Conducting thorough input validation and sanitization on all user-supplied parameters, especially 'entriesPerPage', to prevent malicious SQL code execution. 4) Monitoring database logs and application logs for suspicious queries or unusual activity indicative of exploitation attempts. 5) Segregating the CandidATS application database from critical infrastructure to limit blast radius in case of compromise. 6) Engaging with the vendor or community to obtain patches or updates addressing this vulnerability. 7) Educating IT and security teams about this specific vulnerability to enhance detection and response capabilities. These measures go beyond generic advice by focusing on immediate containment, proactive detection, and minimizing exposure until a vendor fix is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2022-10-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcc0b

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 1:58:38 PM

Last updated: 8/12/2025, 7:42:28 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats