sft
Corrigido em
3.7.13
CVE-2025-7343 describes a critical SQL Injection vulnerability discovered in SFT, a product developed by Digiwin. This vulnerability allows unauthenticated remote attackers to inject arbitrary SQL commands, leading to unauthorized access and manipulation of sensitive data. The vulnerability affects versions 0 through 3.7.12, and a patch is available in version 3.7.13.
The impact of this SQL Injection vulnerability is severe. An attacker could leverage it to bypass authentication and directly interact with the underlying database. This could lead to the complete compromise of the system, including the ability to read confidential data such as user credentials, financial records, or proprietary business information. Furthermore, an attacker could modify or delete data, disrupting operations and potentially causing significant financial and reputational damage. The lack of authentication requirements amplifies the risk, as any external user can attempt exploitation.
CVE-2025-7343 was publicly disclosed on 2025-07-21. The vulnerability's criticality (CVSS 9.8) and ease of exploitation (unauthenticated access) suggest a high probability of exploitation. No public proof-of-concept code has been observed as of this writing, but the nature of SQL Injection vulnerabilities often leads to rapid development of exploits. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.
Organizations utilizing SFT in environments with direct external access are at significant risk. This includes companies relying on SFT for data management or processing, particularly those with legacy configurations or inadequate input validation practices. Shared hosting environments where multiple users share the same SFT instance are also particularly vulnerable.
• linux / server: Monitor SFT application logs for unusual SQL queries or error messages indicating attempted SQL injection. Use journalctl -u sft to filter for relevant log entries. Implement auditd rules to track database access and modifications.
auditctl -w /path/to/sft/database -p wa -k sft_sql_injection• generic web: Use curl to test various endpoints with SQL injection payloads (e.g., ' OR '1'='1). Examine the response for signs of successful injection (e.g., unexpected data, database errors).
curl 'http://sft-server/endpoint?param=' OR '1'='1' --header 'Content-Type: application/x-www-form-urlencoded'disclosure
Status do Exploit
EPSS
0.09% (percentil 26%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2025-7343 is to immediately upgrade to SFT version 3.7.13 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing temporary workarounds. While a direct WAF rule is difficult without specific endpoint details, general SQL Injection prevention rules can offer some protection. Thoroughly review and sanitize all user inputs to prevent malicious SQL code from being injected. After upgrading, confirm the vulnerability is resolved by attempting a SQL injection attack on a non-critical endpoint and verifying that the input is properly sanitized and does not result in database errors.
Actualice Digiwin SFT a una versión posterior a la 3.7.12 para corregir la vulnerabilidad de inyección SQL. Consulte el sitio web de Digiwin para obtener la última versión y las instrucciones de actualización. Aplique las actualizaciones de seguridad tan pronto como estén disponibles.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2025-7343 is a critical SQL Injection vulnerability affecting SFT versions 0 through 3.7.12. It allows attackers to inject malicious SQL code, potentially compromising the entire database.
If you are using SFT versions 0.0 to 3.7.12, you are vulnerable. Verify your version and upgrade immediately.
Upgrade to SFT version 3.7.13 or later to resolve the vulnerability. If immediate upgrade is not possible, implement temporary workarounds like input sanitization.
While no active exploitation has been confirmed, the vulnerability's severity and ease of exploitation suggest a high probability of future attacks. Monitor security advisories.
Refer to the Digiwin security advisory for CVE-2025-7343. Check the Digiwin website or relevant security mailing lists for updates.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.