Skip to main content

CVE-2025-6117: SQL Injection in Das Parking Management System 停车场管理系统

Medium
VulnerabilityCVE-2025-6117cvecve-2025-6117
Published: Mon Jun 16 2025 (06/16/2025, 10:00:12 UTC)
Source: CVE Database V5
Vendor/Project: Das
Product: Parking Management System 停车场管理系统

Description

A vulnerability was found in Das Parking Management System 停车场管理系统 6.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /Reservations/Search of the component API. The manipulation of the argument Value leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/16/2025, 10:34:32 UTC

Technical Analysis

CVE-2025-6117 is a SQL Injection vulnerability identified in version 6.2.0 of the Das Parking Management System (停车场管理系统), specifically within the API endpoint /Reservations/Search. The vulnerability arises from improper sanitization or validation of the 'Value' argument, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been observed in the wild to date. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the network attack vector, low attack complexity, and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is rated as low individually but collectively significant due to the potential for data leakage or disruption of parking management services. The vulnerability affects an essential component of the system that handles reservation searches, which is likely critical for operational continuity in parking facilities using this software.

Potential Impact

For European organizations utilizing the Das Parking Management System 6.2.0, this vulnerability poses a risk of unauthorized access to sensitive reservation and customer data, potentially including personally identifiable information (PII) and payment details. Exploitation could lead to data breaches, undermining customer trust and violating data protection regulations such as GDPR. Additionally, attackers could manipulate reservation data, causing operational disruptions in parking services, leading to financial losses and reputational damage. Given that parking management systems often integrate with broader facility management and security infrastructure, a successful attack could serve as a foothold for lateral movement within organizational networks. The public disclosure of the vulnerability increases the urgency for mitigation to prevent opportunistic attacks. Although no active exploitation is reported, the ease of remote exploitation without authentication elevates the threat level for organizations relying on this system.

Mitigation Recommendations

Organizations should immediately assess their deployment of Das Parking Management System version 6.2.0 and prioritize upgrading to a patched version once available from the vendor. In the absence of an official patch, implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection patterns targeting the /Reservations/Search API endpoint. Conduct thorough input validation and sanitization on all user-supplied inputs, particularly the 'Value' parameter, to prevent injection attacks. Employ database-level protections such as the use of parameterized queries or prepared statements if customization or internal development is possible. Monitor application logs and network traffic for unusual query patterns or spikes in API requests that could indicate exploitation attempts. Additionally, restrict network access to the API endpoint to trusted IPs or through VPNs where feasible, reducing exposure to external attackers. Regularly review and update incident response plans to include scenarios involving SQL injection attacks on critical infrastructure components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-15T10:12:12.398Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684fefaaa8c921274383f680

Added to database: 6/16/2025, 10:19:22 AM

Last enriched: 6/16/2025, 10:34:32 AM

Last updated: 8/16/2025, 1:47:20 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats