Overview
Subrion CMS is vulnerable to SQL injection from authenticated users when a browser cookie is modified in a certain way.
Description
| Subrion is an open source web-based content management system (CMS). Subrion is vulnerable to SQL injection due to deserialization of untrusted data from a browser cookie. CWE-502: Deserialization of Untrusted Data | 
Impact
| An authenticated remote user may execute arbitrary SQL statements on Subrion's database. | 
Solution
| Apply an update | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 9 | AV:N/AC:L/Au:S/C:C/I:C/A:C | 
| Temporal | 7 | E:POC/RL:OF/RC:C | 
| Environmental | 5.3 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND | 
References
Acknowledgements
Thanks to Jack Baker for reporting this vulnerability to us, and to Subrion for quickly addressing this issue.
This document was written by Garret Wassermann.
Other Information
| CVE IDs: | None | 
| Date Public: | 2015-04-27 | 
| Date First Published: | 2015-05-08 | 
| Date Last Updated: | 2015-05-08 14:44 UTC | 
| Document Revision: | 48 |