DEV Community

Sharon
Sharon

Posted on

Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

Weaver e-cology OA is a widely used enterprise collaboration platform developed by Weaver Network Technology, covering HR, finance, administration, and mobile office scenarios.

Recently, a critical SQL injection vulnerability was discovered in Weaver e-cology. Although Weaver has released official patches, many public-facing systems remain unpatched and vulnerable to exploitation.


Vulnerability Overview

The issue stems from improper input sanitization. User-supplied data is concatenated directly into SQL queries, allowing attackers to inject arbitrary SQL statements. This makes it possible to steal or tamper with sensitive business data.


Detection Tools

To help defenders quickly identify whether their systems are affected, two tools are available:

1. X-POC Remote Scanner

Lightweight remote detection utility.

xpoc -r 400 -t http://target.com
Enter fullscreen mode Exit fullscreen mode

Get it here:


2. CloudWalker Local Scanner

Run locally for safe, non-intrusive scanning:

weaver_ecology_sqli_scanner_windows_amd64.exe
Enter fullscreen mode Exit fullscreen mode

Download here:


Affected Versions

  • Weaver e-cology 9 (some versions)

Mitigation & Patching

  • Temporary Workaround: Restrict access to the OA system. Do not expose it directly to the internet unless absolutely necessary.
  • Permanent Fix: Apply the official patch package released by Weaver. Supports both online and offline patching. 👉 Download from Weaver Security Center

Product Support

Several security products have already added detection or protection for this vulnerability:

  • Yuntu: Fingerprint recognition + PoC-based detection.
  • Dongjian: Engine update scheduled for July 11.
  • SafeLine WAF: Virtual patch released, blocks exploitation attempts in real-time.
  • Quanxi: Rule package update available.
  • CloudWalker: Management Platform ≥ 23.05.001 can update EMERVULN-23.07.010 to detect this vuln.

Timeline

  • July 7 — Vulnerability intelligence obtained
  • July 10 — Analysis & reproduction by Chaitin Emergency Response Lab
  • July 11 — Official security advisory published

Final Thoughts

SQL injection is one of the oldest yet most dangerous vulnerabilities out there. If you’re running Weaver e-cology OA, patch immediately and consider adding a Web Application Firewall (like SafeLine WAF) to your stack for real-time virtual patching and long-term protection.


Resources


Join the SafeLine Community

If you continue to experience issues, feel free to contact SafeLine support for further assistance.

Top comments (0)