vendor:
Purei CMS
by:
Number 7
8.1
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Purei CMS
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: CVE-2024-XXXX (Not a real CVE)
CPE: cpe:2.3:a:purei:purei_cms:1.0
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/smb/ms17_010_eternalblue, https://www.infosecmatter.com/why-your-exploit-completed-but-no-session-was-created-try-these-fixes/, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/drupal_restws_unserialize, https://www.infosecmatter.com/nessus-plugin-library/?id=147163, https://www.infosecmatter.com/nessus-plugin-library/?id=136807, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/http/prtg_authenticated_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/drupal_drupalgeddon2, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/thinkphp_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/smb/smb_enumshares
Platforms Tested: Linux
2024
Purei CMS 1.0 – SQL Injection
SQL injection vulnerability in Purei CMS 1.0 allows attackers to manipulate backend SQL statements by injecting malicious code through user inputs, potentially compromising the integrity of the database or exposing sensitive information.
Mitigation:
To mitigate this vulnerability, developers should use parameterized queries or prepared statements to sanitize user inputs and avoid direct concatenation of user input into SQL queries.