CVE-2022-4375 Scanner
CVE-2022-4375 Scanner - SQL Injection vulnerability in Mingsoft MCMS
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
2 weeks 11 hours
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Mingsoft MCMS is a popular content management system used by developers and organizations to create and manage websites efficiently. The software provides a wide range of features, including a user-friendly interface, extensibility through plugins, and robust support for various types of content. Mingsoft MCMS is widely used for e-commerce, blogging, and other website management purposes. It supports multilingual capabilities, making it suitable for global audiences. Its integration capabilities make it a popular choice for businesses aiming to streamline content delivery. However, the widespread use also increases its susceptibility to exploitation.
The vulnerability detected in Mingsoft MCMS is an SQL Injection vulnerability. SQL Injection occurs when an attacker manipulates input parameters to execute arbitrary SQL commands on the database. This particular vulnerability arises due to inadequate input sanitization in the `sqlWhere` parameter in the `/cms/category/list` endpoint. Exploiting this vulnerability allows attackers to interact with the database in unauthorized ways, potentially accessing or modifying sensitive data. The severity of this vulnerability makes it a critical issue for system administrators to address promptly.
The technical details of the vulnerability show that the `sqlWhere` parameter in the `/cms/category/list` endpoint is susceptible to malicious SQL payloads. The parameter does not properly sanitize input, allowing attackers to inject SQL commands. By exploiting this flaw, an attacker can retrieve sensitive data, escalate privileges, or execute other database operations. The issue was identified through specific error messages such as "java.sql.SQLSyntaxErrorException" and database structures like "cms_category" in the response body, indicating improper handling of input data.
Exploitation of this vulnerability can have severe consequences. Attackers could gain unauthorized access to sensitive user data, including personal information, payment details, and login credentials. They might alter or delete critical data, potentially causing system disruptions. In extreme cases, the vulnerability could lead to the complete compromise of the affected application, resulting in reputational damage and legal liabilities for the organization. Moreover, it could pave the way for additional attacks, such as privilege escalation or malware injection.
REFERENCES