CVE-2021-37787

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in ABO.CMS allows attackers to execute arbitrary SQL commands through the unprivileged administrative interface via HTTP POST requests to the TinyMCE module. It affects ABO.CMS versions 5.8 through 5.9.3, potentially compromising database integrity and exposing sensitive information.

💻 Affected Systems

Products:
  • ABO.CMS
Versions: 5.8 through 5.9.3
Operating Systems: Any OS running ABO.CMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the unprivileged administrative interface; TinyMCE module must be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, modification, or deletion; potential privilege escalation to administrative access; possible remote code execution if database configuration permits.

🟠

Likely Case

Unauthorized data access and extraction from the CMS database, including user credentials, content, and configuration data.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place, potentially only causing application errors.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the administrative interface but does not require administrative privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.9.4 or later

Vendor Advisory: https://www.abocms.ru/

Restart Required: No

Instructions:

1. Backup your ABO.CMS installation and database. 2. Download the latest version from the official ABO.CMS website. 3. Replace affected files with patched versions. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Disable TinyMCE Module

all

Temporarily disable the vulnerable TinyMCE module to prevent exploitation.

Edit ABO.CMS configuration to disable TinyMCE module

Implement WAF Rules

all

Add web application firewall rules to block SQL injection patterns targeting the TinyMCE endpoint.

Configure WAF to block SQL injection patterns to /admin/tinymce/ endpoints

🧯 If You Can't Patch

  • Restrict access to the administrative interface using network segmentation and IP whitelisting.
  • Implement input validation and parameterized queries for all TinyMCE-related database operations.

🔍 How to Verify

Check if Vulnerable:

Check if your ABO.CMS version is between 5.8 and 5.9.3 inclusive, and verify if the TinyMCE module is accessible via the administrative interface.

Check Version:

Check ABO.CMS admin panel or configuration files for version information.

Verify Fix Applied:

Confirm ABO.CMS version is 5.9.4 or later, and test that SQL injection attempts against the TinyMCE endpoint no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple POST requests to /admin/tinymce/ endpoints with SQL syntax

Network Indicators:

  • HTTP POST requests to administrative interface containing SQL injection patterns

SIEM Query:

source="web_logs" AND (uri_path="/admin/tinymce/" AND method="POST") AND (content CONTAINS "UNION" OR content CONTAINS "SELECT" OR content CONTAINS "INSERT" OR content CONTAINS "DELETE")

🔗 References

📤 Share & Export