Description
SSCMS v7.4.0 contains a SQL injection vulnerability in the stl:sqlContent tag where the queryString attribute is passed directly to database execution without parameterization or sanitization. Attackers can craft encrypted payloads submitted to the /api/stl/actions/dynamic endpoint to execute arbitrary SQL statements, leading to unauthorized database access, data disclosure, authentication bypass, data modification, or complete database compromise.
Problem types
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
7.4.0 (semver)
Credits
hss94531 (https://github.com/hss94531)
Beatriz Fresno Naumova
References
github.com/siteserver/cms/issues/3891
github.com/siteserver/cms/issues/3891
github.com/siteserver/cms
www.vulncheck.com/...njection-via-stl-sqlcontent-querystring