CVE-2021-40674
📋 TL;DR
This SQL injection vulnerability in Wuzhi CMS v4.1.0 allows attackers to execute arbitrary SQL commands via the KeyValue parameter in the order administration interface. Attackers can potentially access, modify, or delete database content. This affects all deployments using the vulnerable version of Wuzhi CMS.
💻 Affected Systems
- Wuzhi CMS
📦 What is this software?
Wuzhicms by Wuzhicms
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, privilege escalation to administrative access, and potential remote code execution through database functions.
Likely Case
Unauthorized access to sensitive order data, customer information exposure, and potential administrative account takeover.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only read access to non-sensitive data.
🎯 Exploit Status
Exploitation requires access to the admin interface but SQL injection payloads are well-documented and easy to craft.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v4.1.1 or later
Vendor Advisory: https://github.com/wuzhicms/wuzhicms/issues/198
Restart Required: No
Instructions:
1. Download latest version from official repository. 2. Backup current installation. 3. Replace vulnerable files with patched versions. 4. Verify functionality.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize KeyValue parameter before processing
Modify coreframe/app/order/admin/index.php to add parameter validation
Access Restriction
allRestrict access to the vulnerable admin interface using web server rules
Add IP-based restrictions in .htaccess or web server configuration
🧯 If You Can't Patch
- Implement web application firewall (WAF) with SQL injection rules
- Restrict database user permissions to minimum required
🔍 How to Verify
Check if Vulnerable:
Check if /coreframe/app/order/admin/index.php exists and version is 4.1.0
Check Version:
Check version.txt file or admin panel version display
Verify Fix Applied:
Verify version is 4.1.1 or later and test KeyValue parameter with SQL injection test payloads
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts to admin interface
- Suspicious KeyValue parameter values in web logs
Network Indicators:
- POST requests to /coreframe/app/order/admin/index.php with SQL keywords in parameters
SIEM Query:
web.url:*order/admin/index.php AND (web.param:*UNION* OR web.param:*SELECT* OR web.param:*INSERT* OR web.param:*DELETE*)