CVE-2023-34753

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in bloofox v0.5.2.1 allows attackers to execute arbitrary SQL commands via the tid parameter in the admin panel. This affects all users running the vulnerable version, potentially leading to complete database compromise. The vulnerability is particularly dangerous because it's in the administrative interface.

💻 Affected Systems

Products:
  • bloofox
Versions: v0.5.2.1
Operating Systems: Any OS running bloofox
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to admin/index.php path, which is typically protected by authentication but the SQLi could bypass this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database takeover, data exfiltration, privilege escalation to admin, and potential remote code execution if database functions allow it.

🟠

Likely Case

Database information disclosure, authentication bypass, and manipulation of website content and user data.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.

🌐 Internet-Facing: HIGH - The admin interface is typically accessible over the network, making it exploitable remotely.
🏢 Internal Only: MEDIUM - Even if only internally accessible, compromised internal users or lateral movement could exploit this.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection via tid parameter is straightforward to exploit with standard SQLi techniques. Requires admin panel access but SQLi could bypass authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Check for updated version of bloofox
2. If no patch available, implement workarounds
3. Manually fix the vulnerable code by implementing parameterized queries

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize the tid parameter before processing

Modify admin/index.php to add: $tid = intval($_GET['tid']); before SQL query

Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns

Add WAF rule: deny requests containing SQL keywords in tid parameter

🧯 If You Can't Patch

  • Restrict access to admin/index.php using IP whitelisting or network segmentation
  • Implement database user with minimal permissions (read-only where possible)

🔍 How to Verify

Check if Vulnerable:

Test admin/index.php?mode=settings&page=tmpl&action=edit&tid=1' OR '1'='1 and observe if SQL error or unexpected behavior occurs

Check Version:

Check bloofox version in configuration files or admin panel

Verify Fix Applied:

Test the same payload after fixes and confirm proper error handling or rejection occurs

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by SQL errors
  • Unusual database queries from web server process
  • Requests to admin/index.php with SQL keywords in parameters

Network Indicators:

  • HTTP requests containing SQL injection patterns in tid parameter
  • Unusual outbound database connections from web server

SIEM Query:

source="web_logs" AND uri="*admin/index.php*" AND (param="*tid=*'*" OR param="*tid=*%27*")

🔗 References

📤 Share & Export