vendor:
Zenario
by:
Avinash R
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Zenario
Affected Version From: 8.8.52729
Affected Version To: 8.8.52729
Patch Exists: YES
Related CWE: CVE-2021–27673
CPE: a:zenar.io:zenario:8.8.52729
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=149491, https://www.infosecmatter.com/nessus-plugin-library/?id=160441, https://www.infosecmatter.com/nessus-plugin-library/?id=150927, https://www.infosecmatter.com/nessus-plugin-library/?id=144693, https://www.infosecmatter.com/nessus-plugin-library/?id=147690, https://www.infosecmatter.com/nessus-plugin-library/?id=143773, https://www.infosecmatter.com/nessus-plugin-library/?id=144210, https://www.infosecmatter.com/nessus-plugin-library/?id=147512, https://www.infosecmatter.com/nessus-plugin-library/?id=144097
Platforms Tested: Windows 10 Pro
2021
Zenario CMS 8.8.52729 – ‘cID’ Blind & Error based SQL injection (Authenticated)
Login to the admin page of Zenario CMS with admin credentials, which is http://server_ip/zenario/admin.php. Click on, New → HTML page to create a new sample page and intercept it with your interceptor. Just a single quote on the 'cID' parameter will confirm the SQL injection. After confirming that the 'cID' parameter is vulnerable to SQL injection, feeding the request to SQLMAP will do the rest of the work for you.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in SQL queries.