Description
Fuel CMS 1.4.13 contains a blind SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'col' parameter in the Activity Log interface. Attackers can send requests to the logs endpoint with malicious SQL payloads in the 'col' parameter to extract database information based on response time delays.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Rahad Chowdhury
References
www.exploit-db.com/exploits/50523 (ExploitDB-50523)
www.getfuelcms.com/ (Official Product Homepage)
github.com/daylightstudio/FUEL-CMS/archive/1.4.13.zip (Product Reference)
www.vulncheck.com/...s-blind-sql-injection-via-col-parameter (VulnCheck Advisory: Fuel CMS 1.4.13 Blind SQL Injection via col Parameter)