SQL Injection in webSPELL
|Vulnerable Versions:||4.2.4 and probably prior|
|Advisory Publication:||January 22, 2016 [without technical details]|
|Vendor Notification:||January 22, 2016|
|Vendor Fix:||February 12, 2016|
|Public Disclosure:||February 17, 2016|
|Vulnerability Type:||SQL Injection [CWE-89]|
|CVSSv3 Base Score:||6.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L]|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered two vulnerabilities in a popular CMS webSPELL developed for the needs of esport related communities. The vulnerability allows a remote authenticated attacker with cashbox access privileges to execute arbitrary SQL commands in application’s database and completely compromise the vulnerable website. This vulnerability can be also exploited by non-authenticated and unprivileged attacker via the CSRF vector, to which the system is also prone.
|Update to webSPELL 4.2.5|
| High-Tech Bridge Advisory HTB23291 - https://www.immuniweb.com/advisory/HTB23291 - SQL Injection in webSPELL|
 webSPELL - https://www.webspell.org/ - webSPELL is a free content management system under GNU GPL for creating websites easily
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
 ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing.
 ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.