Monday, April 28, 2025
HomeCVE/vulnerabilityHalo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

Published on

SIEM as a Service

Follow Us on Google News

A critical security flaw has been discovered in Halo ITSM, an IT support management software widely deployed across cloud and on-premise environments.

The vulnerability, which allows attackers to inject malicious SQL code, poses a significant threat to organizations relying on the software to manage IT support tickets containing sensitive data such as credentials and internal documentation.

The issue was uncovered through a security audit conducted by researchers who flagged a pre-authentication SQL injection vulnerability in Halo ITSM’s codebase.

- Advertisement - Google News

This vulnerability stems from poor security practices, including inconsistent use of object-relational mapping (ORM) and unsafe string concatenation in SQL queries.

Details of the Vulnerability

The root cause of the vulnerability lies in the use of weakly typed objects, which fail to enforce strict data types. Specifically, the issue is linked to the PostLogMeIn function in the API controller NetHelpDesk.API/Controllers/NotifyController.cs.

This controller accepts untyped dictionary objects, thereby enabling attackers to manipulate input data and inject malicious SQL commands.

The vulnerable code processes JSON objects sent in HTTP POST requests without proper input validation or sanitization.

A crafted request can exploit this flaw by including malicious SQL in the techid parameter, as demonstrated in the proof-of-concept (PoC) request below:

Example Exploit:

POST /api/Notify HTTP/2

Host: vulnerablehost

Content-Type: application/json

{

  "sessionid": "SESSION_ID_VALUE",

  "tracking0": "ticket12345",

  "techid": "1;waitfor delay '0:0:10'--",

  "pickuptime": "2025-03-03T10:00:00",

  "lastactiontime": "2025-03-03T11:30:00"

}

When this request is sent, the SQL query execution is delayed for 10 seconds, confirming the vulnerability’s exploitability.

Since authentication is not enforced on this specific API endpoint, the attack can be carried out without any prior access to the system.

Impact and Mitigation

The vulnerability exposes organizations to data breaches, service disruptions, and unauthorized access to IT support systems.

Attackers could exploit the flaw to access credential data, manipulate support tickets, or escalate their privileges within the affected network.

Halo ITSM has since released a patch addressing the issue, but researchers warn that deeper problems remain in the codebase related to post-authentication attack surfaces.

Wider use of strict typing, input validation, and parameterized SQL queries could have prevented this and other potential vulnerabilities.

Organizations using Halo ITSM should immediately:

  1. Apply the latest security patch provided by Halo ITSM.
  2. Audit their systems for signs of exploitation, particularly unusual API requests or database queries.
  3. Incorporate secure coding practices in software development, emphasizing ORM, data sanitization, and input validation.

While Halo ITSM remains an essential tool for IT support management, this vulnerability highlights the importance of proactive security audits and robust software design to mitigate potential risks.

For further insights, consult your security team or visit Halo ITSM’s official advisory page.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...