CVE-2022-27412
📋 TL;DR
Explore CMS v1.0 contains a SQL injection vulnerability in the page.php endpoint that allows attackers to execute arbitrary SQL commands via the 'id' parameter. This affects all installations of Explore CMS v1.0, potentially compromising the entire database and application. Attackers can exploit this without authentication to steal, modify, or delete data.
💻 Affected Systems
- Explore CMS
📦 What is this software?
Explore Cms by Exploreit
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution if database functions allow it.
Likely Case
Database information disclosure, credential theft, and potential privilege escalation within the application.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
Public exploit code is available. The vulnerability requires no authentication and is trivial to exploit with basic SQL injection knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://exploreit.com.bd
Restart Required: No
Instructions:
No official patch available. Consider migrating to a different CMS or implementing custom fixes with parameterized queries.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize the 'id' parameter in page.php to only accept numeric values
Modify page.php to include: if(!is_numeric($_GET['id'])) { die('Invalid input'); }
Web Application Firewall Rule
allBlock SQL injection patterns in requests to page.php
WAF rule: deny requests to /page.php?id=* containing SQL keywords like UNION, SELECT, INSERT, DELETE, DROP, etc.
🧯 If You Can't Patch
- Isolate the Explore CMS instance behind a reverse proxy with strict input filtering
- Implement network segmentation to limit database access from the web server
🔍 How to Verify
Check if Vulnerable:
Test with payload: /page.php?id=1' OR '1'='1 and observe if SQL error or unexpected behavior occurs
Check Version:
Check CMS version in admin panel or readme files
Verify Fix Applied:
Test with same payload after fix - should return error page or sanitized response without SQL errors
📡 Detection & Monitoring
Log Indicators:
- Multiple requests to page.php with SQL keywords in parameters
- Database error logs showing SQL syntax errors
Network Indicators:
- HTTP requests containing SQL injection patterns in GET parameters
- Unusual database queries originating from web server
SIEM Query:
source="web_logs" AND uri="/page.php" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*' OR '*")