A critical security flaw has been discovered in Halo ITSM, an IT support management software widely deployed across cloud and on-premise environments.
The vulnerability, which allows attackers to inject malicious SQL code, poses a significant threat to organizations relying on the software to manage IT support tickets containing sensitive data such as credentials and internal documentation.
The issue was uncovered through a security audit conducted by researchers who flagged a pre-authentication SQL injection vulnerability in Halo ITSM’s codebase.
This vulnerability stems from poor security practices, including inconsistent use of object-relational mapping (ORM) and unsafe string concatenation in SQL queries.
The root cause of the vulnerability lies in the use of weakly typed objects, which fail to enforce strict data types. Specifically, the issue is linked to the PostLogMeIn function in the API controller NetHelpDesk.API/Controllers/NotifyController.cs.
This controller accepts untyped dictionary objects, thereby enabling attackers to manipulate input data and inject malicious SQL commands.
The vulnerable code processes JSON objects sent in HTTP POST requests without proper input validation or sanitization.
A crafted request can exploit this flaw by including malicious SQL in the techid parameter, as demonstrated in the proof-of-concept (PoC) request below:
Example Exploit:
POST /api/Notify HTTP/2
Host: vulnerablehost
Content-Type: application/json
{
"sessionid": "SESSION_ID_VALUE",
"tracking0": "ticket12345",
"techid": "1;waitfor delay '0:0:10'--",
"pickuptime": "2025-03-03T10:00:00",
"lastactiontime": "2025-03-03T11:30:00"
}
When this request is sent, the SQL query execution is delayed for 10 seconds, confirming the vulnerability’s exploitability.
Since authentication is not enforced on this specific API endpoint, the attack can be carried out without any prior access to the system.
The vulnerability exposes organizations to data breaches, service disruptions, and unauthorized access to IT support systems.
Attackers could exploit the flaw to access credential data, manipulate support tickets, or escalate their privileges within the affected network.
Halo ITSM has since released a patch addressing the issue, but researchers warn that deeper problems remain in the codebase related to post-authentication attack surfaces.
Wider use of strict typing, input validation, and parameterized SQL queries could have prevented this and other potential vulnerabilities.
Organizations using Halo ITSM should immediately:
While Halo ITSM remains an essential tool for IT support management, this vulnerability highlights the importance of proactive security audits and robust software design to mitigate potential risks.
For further insights, consult your security team or visit Halo ITSM’s official advisory page.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage and…
Over 100,000 WordPress websites have been exposed to a critical security vulnerability, following the public…
A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs with…
A newly disclosed vulnerability in Apache Roller, the popular open-source blog server, could allow attackers…
A security flaw in Samsung’s Quick Share feature for the Galaxy S24 series has been…
Across the globe, a new kind of threat is targeting the very institutions dedicated to…