CVE-2024-44921

9.8 CRITICAL

📋 TL;DR

SeaCMS v12.9 contains a SQL injection vulnerability in the id parameter at /dmplayer/dmku/index.php?ac=del. This allows attackers to execute arbitrary SQL commands on the database. All SeaCMS v12.9 installations with the vulnerable component accessible are affected.

💻 Affected Systems

Products:
  • SeaCMS
Versions: v12.9
Operating Systems: Any OS running SeaCMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the dmplayer/dmku component to be present and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or remote code execution via database functions.

🟠

Likely Case

Database information disclosure, authentication bypass, or privilege escalation.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is typically accessible via web interface.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they have network access to the system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via GET parameter is straightforward to exploit with common tools like sqlmap.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize the id parameter before processing.

Modify /dmplayer/dmku/index.php to validate id parameter as integer: if(!is_numeric($_GET['id'])) { die('Invalid input'); }

Web Application Firewall Rule

all

Block SQL injection patterns targeting the vulnerable endpoint.

WAF rule: deny requests to /dmplayer/dmku/index.php?ac=del with SQL injection patterns in id parameter

🧯 If You Can't Patch

  • Restrict access to /dmplayer/dmku/index.php via network ACLs or authentication.
  • Implement database user with minimal privileges for the application.

🔍 How to Verify

Check if Vulnerable:

Test with sqlmap: sqlmap -u "http://target/dmplayer/dmku/index.php?ac=del&id=1" --batch

Check Version:

Check SeaCMS version in admin panel or readme files.

Verify Fix Applied:

Re-run sqlmap test after implementing fixes to confirm SQL injection is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to /dmplayer/dmku/index.php?ac=del with unusual id parameter values
  • SQL error messages in web server logs

Network Indicators:

  • HTTP requests containing SQL keywords (UNION, SELECT, etc.) in id parameter

SIEM Query:

source="web_logs" AND uri="/dmplayer/dmku/index.php" AND query_string="*ac=del*" AND (query_string="*UNION*" OR query_string="*SELECT*" OR query_string="*OR*1=1*")

🔗 References

📤 Share & Export