vendor:
Atom.CMS
by:
Luca Cuzzolin aka czz78
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Atom.CMS
Affected Version From: v2.0
Affected Version To: v2.0
Patch Exists: NO
Related CWE: CVE-2022-24223
CPE: a:thedigicraft:atom.cms:2.0
Tags: packetstorm,cve,cve2022,sqli,atom,cms
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 1, 'verified': True, 'vendor': 'thedigitalcraft', 'product': 'atomcms'}
Platforms Tested: Debian Linux
2022
AtomCMS v2.0 – SQLi
AtomCMS v2.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a malicious payload to the application. The payload can be a time-based blind or a UNION query. The malicious payload can be sent via a POST request to the login.php page.
Mitigation:
Input validation should be used to prevent SQL injection attacks. The application should also be tested for SQL injection vulnerabilities.