This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SQL Injection in ITB-GmbH TradePro v9.5. π **Consequences**: Attackers can execute arbitrary SQL queries via the 'oordershow' component. This leads to potential data theft or system manipulation.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Improper neutralization of special elements used in an SQL command (**SQL Injection**). The 'oordershow' component fails to sanitize user input before querying the database.β¦
π― **Affected**: ITB-GmbH TradePro **v9.5**. Specifically the **B2B e-shop** platform. The vulnerability resides in the **customer functionality** module, specifically the **oordershow** component.
π **Exploit**: **YES**. A public Proof-of-Concept (PoC) is available on GitHub by **caffeinated-labs**. Link: `https://github.com/caffeinated-labs/CVE-2023-36645`. Wild exploitation is possible using this tool.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for **ITB-GmbH TradePro v9.5**. Look for the **oordershow** endpoint in the customer module. Use SQL injection scanners (like SQLMap) targeting this specific component.β¦
π **Workaround**: Since no patch is listed: 1. **Block** access to the `oordershow` component via WAF/Network ACLs. 2. **Restrict** network access to the B2B portal. 3.β¦
π₯ **Urgency**: **CRITICAL**. With `PR:N` (No Privileges) and `AC:L` (Low Complexity), this is a 'plug-and-play' vulnerability for attackers. Immediate isolation or mitigation is required to prevent data breaches.