Redaxo CMS MyEvents Addon SQL Injection Vulnerability (CVE-2018-25319)
Redaxo CMS Addon MyEvents version 2.2.1 contains an SQL injection vulnerability (CVE-2018-25319) that allows authenticated attackers to manipulate database queries by injecting SQL code through the myevents_id parameter, enabling the extraction or modification of sensitive database information.
Redaxo CMS is vulnerable to SQL injection in the MyEvents Addon version 2.2.1. CVE-2018-25319 allows authenticated attackers to inject arbitrary SQL commands via the myevents_id parameter. Successful exploitation allows attackers to manipulate database queries, potentially leading to information disclosure or data modification. This vulnerability requires the attacker to be authenticated, limiting the scope of potential attackers. However, exploitation is relatively straightforward, involving crafted GET requests.
Attack Chain
- The attacker authenticates to the Redaxo CMS instance.
- The attacker crafts a malicious GET request targeting the
/redaxo/index.php?addon=myevents&page=event_addendpoint. - The crafted GET request includes a
myevents_idparameter containing SQL injection payload. For example,myevents_id=1' AND 1=1;--. - The web application processes the request and executes the injected SQL code against the database.
- The injected SQL query allows the attacker to extract sensitive information such as usernames, passwords, or other database content.
- The attacker analyzes the retrieved data to identify further attack vectors or sensitive information.
- The attacker modifies database records to escalate privileges or deface the website.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2018-25319) can lead to unauthorized access to sensitive data, including user credentials and confidential information stored in the Redaxo CMS database. Attackers could potentially escalate their privileges, modify website content, or compromise the entire system. The severity is rated as High with a CVSS score of 7.1.
Recommendation
- Apply any available patches or updates for the Redaxo CMS MyEvents Addon to remediate CVE-2018-25319.
- Deploy the Sigma rule
Detect CVE-2018-25319 Exploitation — Redaxo MyEvents SQL Injectionto identify exploitation attempts in web server logs. - Monitor web server logs for suspicious GET requests to
/redaxo/index.php?addon=myevents&page=event_addwith unusual characters in themyevents_idparameter (see IOCs). - Implement input validation and sanitization for all user-supplied data, especially for parameters used in database queries.
- Enforce least privilege principles to limit the impact of potential SQL injection attacks.
Detection coverage 2
Detect CVE-2018-25319 Exploitation — Redaxo MyEvents SQL Injection
highDetects CVE-2018-25319 exploitation — SQL injection attempts in Redaxo MyEvents Addon via crafted GET requests to event_add.php.
Detect Redaxo MyEvents Addon SQL Injection - Error Responses
mediumDetects potential SQL injection attempts in Redaxo MyEvents Addon based on error responses.
Detection queries are available on the platform. Get full rules →