Pragyan CMS 3.0 - Blind SQL Injection

Overview #

A critical Blind SQL Injection vulnerability exists in Pragyan CMS version 3.0 and earlier, affecting the main index endpoint. The vulnerability allows unauthenticated remote attackers to execute arbitrary SQL commands and potentially compromise the entire database.

Vulnerability Details #

Affected Versions: 3.0 and earlier

Location: Main index endpoint

Affected Parameter: page

Root Cause: The vulnerability exists due to insufficient input validation on the page parameter. User-supplied input is directly concatenated into an SQL query without proper sanitization or parameterized queries.

Exploitation Requirements #

  • No authentication required
  • Direct access to the main index endpoint

Impact #

Remote attackers can exploit this vulnerability to:

  • Extract sensitive data from the database
  • Bypass authentication mechanisms
  • Modify or delete database content
  • Potentially gain administrative access to the CMS

Proof of Concept #

GET /?page='+(SELECT 1 FROM (SELECT SLEEP(25))A)+' HTTP/1.1
Host: target.com

Time-based Blind SQL Injection: If the server response is delayed by 25 seconds, the target is vulnerable.

Solution #

Upgrade to a patched version of Pragyan CMS. Apply the vendor patch that includes proper input sanitization for the affected parameter.

References #