CVE-2023-46482

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in wuzhicms v4.1.0 allows remote attackers to execute arbitrary SQL commands through the database backup functionality. Attackers can potentially read, modify, or delete database contents, and in some configurations execute arbitrary code. All deployments using the vulnerable version are affected.

💻 Affected Systems

Products:
  • wuzhicms
Versions: v4.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to admin interface or vulnerable endpoint

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including arbitrary code execution, data exfiltration, and persistent backdoor installation

🟠

Likely Case

Database compromise leading to data theft, privilege escalation, and potential website defacement

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin access or access to vulnerable endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check for official patch from wuzhicms developers
2. If patch available, apply following vendor instructions
3. Test functionality after patching

🔧 Temporary Workarounds

Disable Database Backup Functionality

linux

Temporarily disable or restrict access to the vulnerable database backup component

# Rename or remove vulnerable file
mv coreframe/app/database/admin/index.php coreframe/app/database/admin/index.php.disabled

Implement Input Validation

all

Add parameterized queries or input validation to the vulnerable file

# Backup original file
cp coreframe/app/database/admin/index.php coreframe/app/database/admin/index.php.backup
# Edit file to implement proper input validation

🧯 If You Can't Patch

  • Restrict network access to admin interface using firewall rules
  • Implement web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running wuzhicms v4.1.0 and if coreframe/app/database/admin/index.php exists with vulnerable code

Check Version:

Check wuzhicms version in configuration files or admin panel

Verify Fix Applied:

Test database backup functionality with malicious inputs to confirm SQL injection is prevented

📡 Detection & Monitoring

Log Indicators:

  • Unusual database backup requests
  • SQL error messages in logs
  • Multiple failed login attempts to admin interface

Network Indicators:

  • Unusual traffic to database backup endpoint
  • SQL injection patterns in HTTP requests

SIEM Query:

source="web_logs" AND (uri="*database/admin/index.php*" AND (method="POST" OR method="GET") AND (query="*sql*" OR query="*union*" OR query="*select*"))

🔗 References

📤 Share & Export