Skip to main content

CVE-2023-6772: CWE-89 SQL Injection in OTCMS

Medium
VulnerabilityCVE-2023-6772cvecve-2023-6772cwe-89
Published: Wed Dec 13 2023 (12/13/2023, 19:00:06 UTC)
Source: CVE
Vendor/Project: n/a
Product: OTCMS

Description

A vulnerability, which was classified as critical, was found in OTCMS 7.01. Affected is an unknown function of the file /admin/ind_backstage.php. The manipulation of the argument sqlContent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247908.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:27:07 UTC

Technical Analysis

CVE-2023-6772 is a SQL Injection vulnerability identified in OTCMS version 7.01, specifically within an unspecified function in the /admin/ind_backstage.php file. The vulnerability arises from improper sanitization or validation of the 'sqlContent' parameter, allowing an attacker to inject malicious SQL code remotely. This flaw enables an attacker with high privileges (as indicated by the CVSS vector requiring PR:H) to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of database availability. Although the CVSS score is 4.7 (medium severity), the vulnerability impacts confidentiality, integrity, and availability to some extent. The attack does not require user interaction but does require authenticated access with elevated privileges, limiting the attack surface to users who have administrative or similar access rights. No public exploits are currently known in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. The lack of available patches or mitigations at the time of disclosure further elevates the urgency for organizations using OTCMS 7.01 to implement compensating controls or upgrade once a fix is available.

Potential Impact

For European organizations using OTCMS 7.01, this vulnerability poses a risk primarily to administrative backend systems. Successful exploitation could lead to unauthorized disclosure of sensitive data, unauthorized modification of database contents, or denial of service through database disruption. Given that OTCMS is a content management system, the impact could extend to website defacement, data leakage of customer or internal information, and potential compliance violations under GDPR if personal data is exposed. The requirement for high privilege authentication reduces the risk from external attackers but elevates the threat from insider threats or compromised administrative accounts. Organizations in sectors with high regulatory scrutiny, such as finance, healthcare, and government, could face significant reputational and legal consequences if exploited. Additionally, the public disclosure of the vulnerability increases the likelihood of targeted attacks, especially if attackers gain administrative credentials through phishing or other means.

Mitigation Recommendations

1. Immediate review and restriction of administrative access to OTCMS backend systems, ensuring only necessary personnel have high privilege accounts. 2. Implement multi-factor authentication (MFA) for all administrative users to reduce the risk of credential compromise. 3. Monitor and audit administrative access logs for unusual activity that could indicate exploitation attempts. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'sqlContent' parameter. 5. Conduct code review and input validation improvements on the 'sqlContent' parameter to sanitize inputs and prevent injection. 6. Engage with the OTCMS vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Consider isolating the affected application environment and limiting database permissions to the minimum necessary to reduce potential damage from exploitation. 8. Educate administrators on phishing and credential security to prevent account compromise that could enable exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-12-13T12:23:34.610Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f67ff0acd01a24926457e

Added to database: 5/22/2025, 6:07:59 PM

Last enriched: 7/8/2025, 8:27:07 AM

Last updated: 8/12/2025, 5:37:52 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats