Submit #262312: CmsEasy CmsEasy <=7.7.7 SQL injectioninfo

TitleCmsEasy CmsEasy <=7.7.7 SQL injection
DescriptionCmsEasy <= 7.7.7 is vulnerable to SQL injection via lib/admin/language_admin.php The CMSEASY content management system (CMS) version 7.7.7 and earlier is susceptible to a SQL injection vulnerability. This security flaw resides in the getslide_child_action function within the lib/admin/slide_admin.php file. The vulnerable function accepts the sid parameter from the URL and incorporates it into a SQL query, making it prone to SQL injection. Upon analysis, it was observed that the condition function, used in the getrows function to validate and filter parameters, lacks proper filtering for the benchmark keyword. This omission allows an attacker to perform a time-based blind SQL injection using payloads such as: sid=1 or benchmark(10000000,md5(5))%23
Source⚠️ https://github.com/V3geD4g/cmseasy_vul/blob/main/SQL1-EN.md
UserV3geD4g (ID 60725)
Submission2024-01-04 10:42 (5 months ago)
Moderation2024-01-14 17:18 (10 days later)
StatusPrzyjęty
VulDB Entry250693

Might our Artificial Intelligence support you?

Check our Alexa App!