CVE-2023-34753
📋 TL;DR
This SQL injection vulnerability in bloofox v0.5.2.1 allows attackers to execute arbitrary SQL commands via the tid parameter in the admin panel. This affects all users running the vulnerable version, potentially leading to complete database compromise. The vulnerability is particularly dangerous because it's in the administrative interface.
💻 Affected Systems
- bloofox
📦 What is this software?
Bloofoxcms by Bloofox
⚠️ Risk & Real-World Impact
Worst Case
Complete database takeover, data exfiltration, privilege escalation to admin, and potential remote code execution if database functions allow it.
Likely Case
Database information disclosure, authentication bypass, and manipulation of website content and user data.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.
🎯 Exploit Status
SQL injection via tid parameter is straightforward to exploit with standard SQLi techniques. Requires admin panel access but SQLi could bypass authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official vendor advisory found
Restart Required: No
Instructions:
1. Check for updated version of bloofox
2. If no patch available, implement workarounds
3. Manually fix the vulnerable code by implementing parameterized queries
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize the tid parameter before processing
Modify admin/index.php to add: $tid = intval($_GET['tid']); before SQL query
Web Application Firewall
allDeploy WAF rules to block SQL injection patterns
Add WAF rule: deny requests containing SQL keywords in tid parameter
🧯 If You Can't Patch
- Restrict access to admin/index.php using IP whitelisting or network segmentation
- Implement database user with minimal permissions (read-only where possible)
🔍 How to Verify
Check if Vulnerable:
Test admin/index.php?mode=settings&page=tmpl&action=edit&tid=1' OR '1'='1 and observe if SQL error or unexpected behavior occurs
Check Version:
Check bloofox version in configuration files or admin panel
Verify Fix Applied:
Test the same payload after fixes and confirm proper error handling or rejection occurs
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by SQL errors
- Unusual database queries from web server process
- Requests to admin/index.php with SQL keywords in parameters
Network Indicators:
- HTTP requests containing SQL injection patterns in tid parameter
- Unusual outbound database connections from web server
SIEM Query:
source="web_logs" AND uri="*admin/index.php*" AND (param="*tid=*'*" OR param="*tid=*%27*")