CVE-2019-25505
SQL Injection in Tradebox 5.4 Allows Database Data Extraction
Publication date: 2026-03-04
Last updated on: 2026-03-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bdtask | tradebox | 5.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2019-25505 is an SQL injection vulnerability found in Tradebox version 5.4. It allows authenticated attackers to manipulate database queries by injecting malicious SQL code through the 'symbol' parameter in POST requests to the monthly_deposit endpoint."}, {'type': 'paragraph', 'content': 'Attackers can use various SQL injection techniques such as boolean-based blind, time-based blind, error-based, and union-based methods to exploit this flaw. This enables them to extract sensitive information from the backend database.'}, {'type': 'paragraph', 'content': "The vulnerability requires the attacker to be authenticated and involves sending specially crafted POST requests containing the 'symbol' parameter with malicious SQL payloads."}] [1, 2]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability can have a significant impact by allowing attackers to bypass authorization controls and retrieve sensitive information from the Tradebox database.'}, {'type': 'paragraph', 'content': "Since the attacker can extract sensitive data through SQL injection, this could lead to data breaches, exposure of confidential information, and potential compromise of the trading platform's integrity."}, {'type': 'paragraph', 'content': 'The vulnerability has a high severity score (CVSS 7.1), indicating that it poses a serious security risk if exploited.'}] [1, 2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This SQL injection vulnerability can be detected by sending crafted POST requests to the /backend/dashboard/home/monthly_deposit endpoint with malicious payloads in the 'symbol' parameter and observing the responses or behavior."}, {'type': 'list_item', 'content': "Boolean-based blind SQL Injection test using payload: symbol=USD' AND 8149=8149 AND 'PuLt'='PuLt"}, {'type': 'list_item', 'content': "Time-based blind SQL Injection test using payload: symbol=USD' OR (SELECT * FROM (SELECT(SLEEP(5)))rBnp) AND 'wNyS'='wNyS (look for delayed response)"}, {'type': 'list_item', 'content': "Error-based SQL Injection test using payload: symbol=USD' AND (SELECT 5276 FROM(SELECT COUNT(*),CONCAT(0x7162707671,(SELECT (ELT(5276=5276,1))),0x7171787171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'CnKo'='CnKo (look for database error messages)"}, {'type': 'list_item', 'content': "Union-based SQL Injection test using payload: symbol=USD' UNION ALL SELECT NULL,CONCAT(0x7162707671,0x75664d4466634a4d505554424d6d6a577957506a51534d734c6e7551516f436f71444e77796f4a63,0x7171787171)-- (look for injected data in response)"}, {'type': 'paragraph', 'content': "These tests require sending POST requests with the 'csrf_test_name' parameter included alongside the 'symbol' parameter."}] [1]
What immediate steps should I take to mitigate this vulnerability?
I don't know