Pragyan CMS 3.0 Blind SQL Injection
Pragyan CMS 3.0 - Blind Pragyan CMS 3.0 Blind SQL Injection
Pragyan CMS 3.0 - Blind SQL Injection
Advisory ID: RO-14-001
Severity: Critical
Vendor: Delta
Product: Pragyan CMS
Version: 3
Overview #
A critical Blind SQL Injection vulnerability exists in Pragyan CMS version 3.0 and earlier, affecting the main index endpoint. The vulnerability allows unauthenticated remote attackers to execute arbitrary SQL commands and potentially compromise the entire database.
Vulnerability Details #
Affected Versions: 3.0 and earlier
Location: Main index endpoint
Affected Parameter: page
Root Cause: The vulnerability exists due to insufficient input validation on the page parameter. User-supplied input is directly concatenated into an SQL query without proper sanitization or parameterized queries.
Exploitation Requirements #
No authentication required
Direct access to the main index endpoint
Impact #
Remote attackers can exploit this vulnerability to:
Extract sensitive data from the database
Bypass authentication mechanisms
Modify or delete database content
Potentially gain administrative access to the CMS
Proof of Concept #
GET /?page='+(SELECT 1 FROM (SELECT SLEEP(25))A)+' HTTP/1.1
Host: target.com
Time-based Blind SQL Injection: If the server response is delayed by 25 seconds, the target is vulnerable.
Solution #
Upgrade to a patched version of Pragyan CMS. Apply the vendor patch that includes proper input sanitization for the affected parameter.
References #
Invicti Advisory NS-14-001
GitHub Patch
Timeline:
[2014-01-01] - Discovered
Credits: Omar Kurt
Pragyan CMS 3.0 Blind SQL Injection
- Details
- Written by: khalil shreateh
- Category: Vulnerabilities
- Hits: 49