Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request

Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request

Posted on January 26, 2026January 26, 2026 By CWS

Attackers are more and more turning their consideration to building companies by abusing weaknesses in enterprise software program that runs on their job websites.

One of many latest targets is the Mjobtime building time-tracking utility, which is commonly deployed on Microsoft IIS with an MSSQL database within the background.

A blind SQL injection flaw in Mjobtime model 15.7.2, tracked as CVE-2025-51683, permits distant attackers to ship crafted HTTP POST requests to the app’s /Default.aspx/update_profile_Server endpoint and drive the database to run system instructions.

This assault path provides intruders a direct line from a public-facing net type into the database engine, the place they will abuse highly effective options meant for directors.

In actual incidents, the malicious site visitors first reveals up in IIS logs as repeated POST requests to the weak endpoint, adopted by the activation of the xp_cmdshell prolonged saved process within the Mjobtime MSSQL occasion.

As soon as enabled, xp_cmdshell lets the attacker run working system instructions with the service account’s permissions, usually giving them deep management over the Home windows host.

Huntress analysts famous this sample in three separate buyer environments throughout 2025, all tied to Mjobtime deployments within the building sector.

Within the first case, they recorded the risk actor utilizing xp_cmdshell to run instructions equivalent to “cmd /c internet consumer” and a ping to an exterior oastify.com area, clear indicators of discovery and callback testing from the compromised database server.

Course of tree (Supply – Huntress)

Within the different two instances, the attackers tried to tug distant payloads utilizing wget and curl, however had been stopped earlier than they might comply with by way of with additional phases of the intrusion. The method tree related to these instructions on one affected host.

From IIS POST Request to MSSQL Command Execution

The an infection chain begins when an attacker sends a specifically crafted POST request to the update_profile_Server perform uncovered by the Mjobtime net entrance finish.

Due to the blind SQL injection bug, the net utility passes attacker-controlled enter to the MSSQL backend with out correct checks, letting the intruder manipulate queries that the appliance runs on the database.

AI-generated search engine documentation of the vulnerability and threat (Supply – Huntress)

Over a number of requests, the attacker makes use of this management to allow xp_cmdshell on the Mjobtime occasion after which executes system-level instructions.

Excerpt of Dario’s public write-up, which supplies tell-tale indicators of what to search for when makes an attempt are made to use the vulnerability (Supply – Huntress)

It reveals proof-of-concept payloads from the InfoGuard Labs analysis that mirror the habits seen within the Huntress instances.

As soon as xp_cmdshell is stay, the database server successfully turns into a distant shell behind the firewall, reachable by way of what seems to be like regular net site visitors.

This not solely exposes delicate building mission and payroll information, but in addition supplies a foothold an attacker can use to maneuver deeper into the community if not shortly contained.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:App, Attackers, Construction, Exploiting, Firms, IIS, Mjobtime, MSSQL, Post, Request, Targeting, Vulnerability

Post navigation

Previous Post: Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat
Next Post: 48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database

Related Posts

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News
Critical Chrome Security Flaws Allow Remote Code Execution Critical Chrome Security Flaws Allow Remote Code Execution Cyber Security News
Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files Cyber Security News
Critical Hikvision Vulnerability Threatens Wireless Access Points Critical Hikvision Vulnerability Threatens Wireless Access Points Cyber Security News
Sendmarc Appoints Dan Levinson as Customer Success Director in North America Sendmarc Appoints Dan Levinson as Customer Success Director in North America Cyber Security News
New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark