CVE-2015-5617
📋 TL;DR
This CVE describes a SQL injection vulnerability in Enorth Webpublisher CMS that allows remote attackers to execute arbitrary SQL commands via the cbNewsId parameter in the delete_pending_news.jsp file. Attackers can potentially read, modify, or delete database content, and in worst cases achieve remote code execution. Any organization running Enorth Webpublisher CMS with the vulnerable component exposed is affected.
💻 Affected Systems
- Enorth Webpublisher CMS
📦 What is this software?
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise including remote code execution, data exfiltration, and persistent backdoor installation
Likely Case
Database compromise leading to data theft, privilege escalation, and potential lateral movement within the network
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-critical data
🎯 Exploit Status
Simple SQL injection via GET parameter with public exploit code available since 2015
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
No official patch available. Apply input validation and parameterized queries to the vulnerable JSP file.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize cbNewsId parameter before SQL execution
Modify delete_pending_news.jsp to validate cbNewsId contains only numeric characters
Web Application Firewall Rule
allBlock SQL injection patterns targeting the vulnerable endpoint
WAF rule: Block requests to /pub/m_pending_news/delete_pending_news.jsp containing SQL keywords in parameters
🧯 If You Can't Patch
- Block access to /pub/m_pending_news/delete_pending_news.jsp at network perimeter
- Implement database user with minimal privileges for the application
🔍 How to Verify
Check if Vulnerable:
Test by accessing http://[target]/pub/m_pending_news/delete_pending_news.jsp?cbNewsId=1' OR '1'='1 and checking for SQL errors
Check Version:
Check CMS version through admin interface or configuration files
Verify Fix Applied:
Attempt SQL injection payloads and verify they are rejected or sanitized
📡 Detection & Monitoring
Log Indicators:
- SQL error messages in web logs
- Multiple requests to delete_pending_news.jsp with SQL keywords
Network Indicators:
- HTTP requests containing SQL injection patterns targeting the vulnerable endpoint
SIEM Query:
source="web_logs" AND uri="/pub/m_pending_news/delete_pending_news.jsp" AND (param="cbNewsId" AND value MATCH "[';]|(OR|AND|SELECT|UNION)")