CVE-2018-7732
📋 TL;DR
CVE-2018-7732 is a SQL injection vulnerability in YxtCMF 3.1 that allows attackers to execute arbitrary SQL commands via the 'ids' array parameter in ShitiController.class.php. This affects all users running vulnerable versions of YxtCMF, potentially compromising database integrity and confidentiality.
💻 Affected Systems
- YxtCMF
📦 What is this software?
Yxtcmf by Yxtcmf
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, modification, deletion, and potential remote code execution through database functions.
Likely Case
Unauthorized data access, privilege escalation, and data manipulation leading to application compromise.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
SQL injection via array parameter is straightforward to exploit with basic web testing tools.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: No
Instructions:
1. Review and update YxtCMF to latest version if available
2. Manually patch ShitiController.class.php to implement parameterized queries
3. Validate and sanitize all user inputs, especially array parameters
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns in the ids parameter
Input Validation Filter
allImplement server-side validation to reject non-numeric values in ids array
🧯 If You Can't Patch
- Isolate the vulnerable system behind network segmentation
- Implement strict access controls and monitor all database queries from the affected endpoint
🔍 How to Verify
Check if Vulnerable:
Test the exam/shiti/delshiti.html endpoint with SQL injection payloads in the ids parameter
Check Version:
Check YxtCMF version configuration files or admin panel
Verify Fix Applied:
Verify that parameterized queries are implemented and SQL injection attempts are rejected
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries from ShitiController
- SQL error messages in application logs
- Multiple DELETE/UPDATE operations from single request
Network Indicators:
- HTTP POST requests to exam/shiti/delshiti.html with SQL keywords in parameters
SIEM Query:
web.url:*exam/shiti/delshiti.html AND (web.param.ids:*SELECT* OR web.param.ids:*UNION* OR web.param.ids:*DELETE*)