CVE-2025-29085 Scanner

CVE-2025-29085 Scanner - SQL Injection vulnerability in Vipshop Saturn Console

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

11 days 15 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Vipshop Saturn Console is utilized by companies seeking efficient backend operation management, particularly in e-commerce settings. It allows admins to monitor system performance, manage clusters, and maintain overall system health. Various tech teams within an organization use this console to execute system operations and troubleshoot issues. The console's user-friendly interface and comprehensive feature set make it a favored choice for operational teams. Furthermore, Vipshop Saturn Console seamlessly integrates with other tools within the Vipshop ecosystem, thereby providing a cohesive user experience. Its primary purpose is to simplify complex system administration tasks, enhancing efficiency for backend operations.

SQL injection vulnerabilities arise when an attacker manipulates a standard SQL query by injecting unexpected inputs. This vulnerability allows attackers to interface directly with the database employed by the Vipshop Saturn Console. Through manipulating existing code structures, an attacker can execute unauthorized commands, retrieve data, and even alter database contents. Particularly concerning is the potential for attackers to escalate their privileges, granting them more control than originally permitted. The detected vulnerability particularly affects the zkClusterKey component in version 3.5.1 and earlier, which is designed for executing backend tasks. Addressing such vulnerabilities is crucial to safeguarding data integrity and preventing unauthorized database access.

Technical details reveal that the vulnerability leverages a parameter in the /console/dashboard/executorCount endpoint. Particularly, the zkClusterKey parameter is susceptible to SQL manipulation. By cleverly manipulating inputs, attackers can induce the system to execute unintended SQL commands. As a part of this attack, something as simple as SQL syntax could be used to reveal sensitive database information. A successful attack could expose the queries executed by backend processes, giving insights into database structure and operations. The vulnerability extends to potential privilege escalation, allowing an attacker to perform actions way beyond initial entry point permissions.

If the vulnerability is exploited by malicious actors, there's a significant risk of unauthorized access and control over the database, leading to potential data leaks. Sense of control loss over database functions can disrupt services, mismanage resources, and steal confidential information. SQL Injection vulnerabilities can also lead to financial overhauls, reputational damage, and legal complications for the affected organization. Sensitive customer data could be exposed, affecting customer trust and potentially violating privacy regulations. Attackers could also introduce malicious content into the database, further complicating recovery efforts and system integrity.

REFERENCES

Get started to protecting your digital assets