CNVD-2019-16769 Scanner
CNVD-2019-16769 Scanner - SQL Injection vulnerability in AIKCMS
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 3 days
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
AIKCMS is a CMS website building system based on PHP and MySQL architecture with support for multiple languages and a responsive display. It is used for creating personal and professional websites. The CMS provides a user-friendly interface and customization options that make it suitable for people with varying levels of technical knowledge. AIKCMS is popular among small to medium-sized businesses for its ease of use and cost-effectiveness. The system allows for the integration of various plugins and extensions to enhance site functionality. Its flexibility and scalability make it a preferred choice for dynamic content management.
The SQL Injection vulnerability detected in AIKCMS version 2.0 allows attackers to manipulate and execute arbitrary SQL code. This type of vulnerability typically arises when user inputs are not properly sanitized and validated before being included in SQL queries. Attackers can exploit these vulnerabilities to access sensitive data, including user credentials, financial information, or other critical data stored in the database. This vulnerability is classified as a time-based blind SQL injection, which means that attackers can infer information from the database based on the response time of the SQL queries. Successful exploitation can compromise the confidentiality, integrity, and availability of the affected system.
The vulnerability is located in the nav_edit.php file of the AIKCMS backend. An attacker can execute a malicious payload via the id parameter, using the time-based blind SQL injection technique to extract data. The primary endpoint accepting these requests is /admin/page/video/videogroup_edit.php. The vulnerability allows the attacker to send specially crafted requests that can manipulate the application's database queries. By modifying query handles and inserting SQL commands, unauthorized access to restricted database areas can be gained. This flaw allows discerning changes in query execution times to retrieve information from the database.
If exploited, the SQL Injection vulnerability can let an attacker compromise critical application functions, view, modify, or delete database entries, and escalate privileges. Unauthorized access to sensitive information stored in the database can severely impact privacy and data protection measures. Data modification can disrupt the application's proper operation, potentially resulting in service disruption or data corruption. There is also a risk of lateral movement where an attacker leverages one compromise to gain further access. Overall, this could lead to significant data breaches and financial and reputational damages to affected organizations.
REFERENCES