CVE-2023-34545

9.8 CRITICAL

📋 TL;DR

A critical SQL injection vulnerability in CSZCMS 1.3.0 allows remote attackers to execute arbitrary SQL commands through the p parameter or search URL. This affects all installations of CSZCMS 1.3.0, potentially compromising the entire database and application.

💻 Affected Systems

Products:
  • CSZCMS
Versions: 1.3.0
Operating Systems: All platforms running CSZCMS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of CSZCMS 1.3.0 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, and remote code execution via database functions.

🟠

Likely Case

Database information disclosure, authentication bypass, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via web requests and affects internet-facing CMS installations.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but have reduced attack surface compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is easily exploitable with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.cszcms.com/

Restart Required: No

Instructions:

Check vendor website for security updates. If no patch is available, consider migrating to alternative CMS or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for p parameter and search functionality to block SQL injection attempts.

Modify application code to sanitize user inputs using prepared statements or parameterized queries

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns in p parameter and search URLs.

Configure WAF to block requests containing SQL keywords in p parameter or search queries

🧯 If You Can't Patch

  • Isolate the CSZCMS instance behind a reverse proxy with strict input filtering
  • Implement network segmentation to limit database access from the web application

🔍 How to Verify

Check if Vulnerable:

Test the p parameter or search functionality with SQL injection payloads like ' OR '1'='1

Check Version:

Check CSZCMS version in admin panel or configuration files

Verify Fix Applied:

Test with SQL injection payloads after implementing fixes to ensure they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts via search/p parameters
  • Suspicious database queries

Network Indicators:

  • HTTP requests with SQL keywords in p parameter or search URLs
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND (uri="*p=*sql*" OR uri="*search=*sql*" OR uri="*p=*union*" OR uri="*search=*union*")

🔗 References

📤 Share & Export