CMS Made Simple (CMSMS) < 2.2.10 Unauthenticated SQL Injection (CVE-2019-9053)

中文版本(Chinese version)

CMS Made Simple (CMSMS) is a free, open source content management system to provide developers, programmers and site owners a web-based development and administration area.

In the version prior to 2.2.9.1, CMS Made Simple was affected by a unauthenticated SQL injection attack, which attacker is able to gain the administrator's password or password reset token. Combining the authenticated SSTI issue (CVE-2021-26120), could allow an attacker to execute arbitrary code on the target server.

References:

Vulnerable Environment

Execute following command to start a CMS Made Simple 2.2.9.1:

docker compose up -d

After the server is started, you should install the CMS at http://your-ip/install.php.

Following the install instructions to install the CMSMS, MySQL database address is db, database name is cmsms, username and password are both root.

Exploit

Use the script on https://www.exploit-db.com/exploits/46635 to exploit the SQL injection vulnerability:

python2 poc.py -u http://127.0.0.1

As you can see, the administrator's password is exposed by SQL injection.