SQL Injection Vulnerability in DedeCMS 5.7.112-UTF8
CVE-2024-3685

9.8CRITICAL

Key Information:

Vendor
DedeCMS
Status
Vendor
CVE Published:
12 April 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A critical SQL injection vulnerability has been identified in the DedeCMS version 5.7.112-UTF8, specifically in the stepselect_main.php file. The vulnerability arises due to improper handling of the 'ids' argument, allowing attackers to execute arbitrary SQL commands through specially crafted requests. This issue can be exploited remotely, making it particularly dangerous for websites utilizing this CMS. The problem has been publicly disclosed, and no response has been received from the vendor regarding the security concerns. For more detailed information, refer to VDB-260472, which outlines the technical aspects and implications of the vulnerability.

Affected Version(s)

DedeCMS 5.7.112-UTF8

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ting (VulDB User)
.