CVE-2022-30047
📋 TL;DR
Mingsoft MCMS v5.2.7 contains a SQL injection vulnerability in the /mdiy/dict/listExcludeApp endpoint via the orderBy parameter. This allows attackers to execute arbitrary SQL commands on the database. All systems running the vulnerable version are affected.
💻 Affected Systems
- Mingsoft MCMS
📦 What is this software?
Mcms by Mingsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data manipulation, or remote code execution via database functions.
Likely Case
Unauthorized data access, extraction of sensitive information, or database manipulation.
If Mitigated
Limited impact with proper input validation and parameterized queries in place.
🎯 Exploit Status
Exploitation is straightforward via crafted HTTP requests to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v5.2.8 or later
Vendor Advisory: https://gitee.com/mingSoft/MCMS/issues/I54VLM
Restart Required: Yes
Instructions:
1. Backup your database and application files. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with patched ones. 4. Restart the web server.
🔧 Temporary Workarounds
Input Validation Filter
allImplement strict input validation for the orderBy parameter to allow only safe characters.
Modify the application code to sanitize the orderBy parameter before use in SQL queries.
Web Application Firewall (WAF)
allDeploy a WAF to block SQL injection attempts targeting the vulnerable endpoint.
Configure WAF rules to detect and block malicious orderBy parameter values.
🧯 If You Can't Patch
- Restrict access to the /mdiy/dict/listExcludeApp endpoint using network ACLs or authentication.
- Monitor logs for unusual SQL queries or access patterns to the vulnerable endpoint.
🔍 How to Verify
Check if Vulnerable:
Check if the application version is v5.2.7 by reviewing the software configuration or version files.
Check Version:
Check the application's version file or configuration settings; no universal command exists.
Verify Fix Applied:
Verify the application has been updated to v5.2.8 or later and test the endpoint with safe input.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- HTTP requests to /mdiy/dict/listExcludeApp with suspicious orderBy parameters
Network Indicators:
- HTTP traffic containing SQL keywords in the orderBy parameter
SIEM Query:
source="web_logs" AND uri="/mdiy/dict/listExcludeApp" AND (orderBy CONTAINS "SELECT" OR orderBy CONTAINS "UNION" OR orderBy CONTAINS "OR")