SQL Injection Vulnerability in DedeCMS 5.7.112-UTF8
CVE-2024-3685
Key Information:
Badges
Summary
A critical SQL injection vulnerability has been identified in the DedeCMS version 5.7.112-UTF8, specifically in the stepselect_main.php file. The vulnerability arises due to improper handling of the 'ids' argument, allowing attackers to execute arbitrary SQL commands through specially crafted requests. This issue can be exploited remotely, making it particularly dangerous for websites utilizing this CMS. The problem has been publicly disclosed, and no response has been received from the vendor regarding the security concerns. For more detailed information, refer to VDB-260472, which outlines the technical aspects and implications of the vulnerability.
Affected Version(s)
DedeCMS 5.7.112-UTF8
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved