Subrion CMS is a free and open-source content management system (CMS) that provides flexibility for users to create various types of websites. Powered by PHP and MySQL, it is widely adopted for its ease of use, customization options, and extensibility.
However, like any software, security vulnerabilities can emerge, potentially exposing websites to malicious attacks.
One such vulnerability was discovered in Subrion CMS versions prior to 4.1.5.10, specifically in the /front/search.php file. This flaw allows attackers to exploit a SQL Injection (SQLi) vulnerability via the $_GET array, leading to unauthorized database access.
There are several critical impacts to the discovered vulnerability in Subrion CMS version prior to 4.1.5.10.
Attackers can extract usernames, emails, and password hashes from the database. If weak hashing algorithms are used, passwords can be cracked and used for account takeovers. Hackers can also gain access to admin accounts and hijack websites.
Attackers can escalate privileges and log in as administrators by modifying authentication queries. This allows them to take full control of the website, delete or modify content, and lock out legitimate users.
SQL injection could allow the attacker to inject malicious JavaScript or alter website content. The attacker can replace the homepage with defacement messages or phishing pages.
Attackers can inject destructive SQL queries that drop database tables or modify critical data. This could lead to a complete website failure or permanent loss of content.
Attackers can modify database content to insert spam links or malicious redirects. Search engines (Google, Bing) may blacklist the website if it’s found serving harmful content.
Subrion CMS users must upgrade to version 4.1.5.10 or later to prevent exploitation. Implement input validation and prepare statements. Additionally, deploying a Web Application Firewall (WAF) and conducting regular security audits can significantly reduce the risk of exploitation.