SQL Injection and RCE in WebsiteBaker
Advisory ID: | HTB23296 |
Product: | WebsiteBaker |
Vendor: | WebsiteBaker Org e.V. |
Vulnerable Versions: | 2.8.3-SP5 and probably prior |
Tested Version: | 2.8.3-SP5 |
Advisory Publication: | February 24, 2016 [without technical details] |
Vendor Notification: | February 24, 2016 |
Vendor Fix: | February 26, 2016 |
Public Disclosure: | March 18, 2016 |
Latest Update: | February 26, 2016 |
Vulnerability Type: | SQL Injection [CWE-89] |
CVE Reference: | Pending |
Risk Level: | High |
CVSSv2 Base Score: | 8.1 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H] |
Solution Status: | Fixed by Vendor |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered SQL injection vulnerability in WebsiteBaker CMS. A remote attacker will be able to read, write or modify arbitrary information in the database, gain complete control over the vulnerable web application and even the entire web server on which the application is hosted. | |
Solution: | |
Update to WebsiteBaker 2.8.3 SP6 RC3.0 More Information: http://addon.websitebaker.org/pages/en/browse-add-ons.php?id=06C9F242 | |
References: | |
[1] High-Tech Bridge Advisory HTB23296 - https://www.immuniweb.com/advisory/HTB23296 - SQL Injection and RCE in WebsiteBaker [2] WebsiteBaker - http://websitebaker.org - WebsiteBaker helps you to create the website you want: A free, easy and secure, flexible and extensible open source content management system (CMS). [3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [4] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [5] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.