CVE-2022-38922
📋 TL;DR
BluePage CMS through version 3.9 has a SQL injection vulnerability in the 'users-cookie-settings' token due to insufficient sanitization of HTTP Cookie headers. Attackers can exploit this using time-based blind SQL injection payloads to potentially extract, modify, or delete database contents. All users running BluePage CMS versions up to 3.9 are affected.
💻 Affected Systems
- BluePage CMS
📦 What is this software?
Bluepage Cms by Iss Oberlausitz
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, authentication bypass, remote code execution, or complete system takeover.
Likely Case
Database information disclosure, user credential theft, and potential privilege escalation.
If Mitigated
Limited impact with proper input validation, WAF rules, and database permissions in place.
🎯 Exploit Status
Time-based blind SQL injection requires no authentication and has public proof-of-concept available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.bluepage-cms.com/index.php
Restart Required: No
Instructions:
Check vendor website for updates. If no patch available, consider migrating to alternative CMS or implementing workarounds.
🔧 Temporary Workarounds
WAF Rule Implementation
allDeploy web application firewall rules to block SQL injection patterns in cookie headers.
Input Validation Filter
allImplement custom input validation to sanitize cookie values before processing.
🧯 If You Can't Patch
- Implement strict input validation for all cookie parameters
- Restrict database user permissions to minimum required
🔍 How to Verify
Check if Vulnerable:
Test with time-based SQL injection payload in cookie header: 'users-cookie-settings' parameter with SLEEP() function.
Check Version:
Check CMS version in admin panel or configuration files.
Verify Fix Applied:
Verify that time-based payloads no longer cause delayed responses and input is properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual cookie values containing SQL keywords
- Multiple requests with similar patterns but varying cookie parameters
- Requests with SLEEP() or BENCHMARK() in cookie headers
Network Indicators:
- HTTP requests with SQL injection patterns in cookie headers
- Unusually long response times for specific cookie values
SIEM Query:
http.cookie contains "SLEEP" OR http.cookie contains "BENCHMARK" OR http.cookie contains "UNION"
🔗 References
- https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md
- https://www.bluepage-cms.com/index.php
- https://www.iss-oberlausitz.de/index.php
- https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md
- https://www.bluepage-cms.com/index.php
- https://www.iss-oberlausitz.de/index.php