CVE-2019-25366
microASP · Portal+ CMS
An unauthenticated SQL injection vulnerability in microASP Portal+ CMS allows remote attackers to execute arbitrary SQL queries via the explode_tree parameter.
Executive summary
The microASP Portal+ CMS is susceptible to a high-severity SQL injection attack that allows unauthenticated users to access or delete sensitive database information.
Vulnerability
This vulnerability is a classic SQL injection flaw located in the "explode_tree" parameter. Because the application does not validate this input, an unauthenticated remote attacker can submit crafted SQL commands to be executed by the database server.
Business impact
With a CVSS score of 8.2, the impact of this vulnerability is severe. An attacker could bypass all authentication mechanisms, extract the entire user database, or modify website content, leading to significant financial loss and long-term reputational damage for the organization.
Remediation
Immediate Action: Update the microASP Portal+ CMS to the latest version immediately. Ensure the patch specifically addresses input validation for the explode_tree parameter.
Proactive Monitoring: Organizations should audit their database logs for any suspicious activity targeting the explode_tree parameter and review for any unauthorized administrative account creation.
Compensating Controls: Use a Web Application Firewall (WAF) to filter out SQL injection strings in GET and POST requests to the affected CMS.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Because this vulnerability is unauthenticated and provides direct database access, it must be treated with the highest urgency. Immediate patching is required to secure the environment against automated exploitation attempts.