Impact
An SQL injection vulnerability was discovered in the report/data/proofofplayReport
API route inside the CMS. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the sortBy
parameter.
Exploitation of the vulnerability is possible on behalf of an authorized user who has the following privileges:
- Access to Reporting feature
- View access to arbitrary display
This is only possible for CMS instances configured to use MySQL as their time series store, which is the default configuration.
Patches
Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue. Customers who host their CMS with Xibo Signage were not effected by this advisory.
Workarounds
Upgrading to a fixed version is necessary to remediate.
Patches are available for earlier versions of Xibo CMS that are out of security support:
References
Xibo Signage Security Advisory - https://xibosignage.com/blog/security-advisory-2024-07
Reporter ref: K-Xibo-2024-004 Xibo CMS SQL Injection
Acknowledgements
The vulnerability was discovered by Sergey Bobrov (Kaspersky, https://kaspersky.com/)
https://github.com/BlackFan
Impact
An SQL injection vulnerability was discovered in the
report/data/proofofplayReport
API route inside the CMS. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to thesortBy
parameter.Exploitation of the vulnerability is possible on behalf of an authorized user who has the following privileges:
- Access to Reporting feature
- View access to arbitrary display
This is only possible for CMS instances configured to use MySQL as their time series store, which is the default configuration.
Patches
Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue. Customers who host their CMS with Xibo Signage were not effected by this advisory.
Workarounds
Upgrading to a fixed version is necessary to remediate.
Patches are available for earlier versions of Xibo CMS that are out of security support:
References
Xibo Signage Security Advisory - https://xibosignage.com/blog/security-advisory-2024-07
Reporter ref: K-Xibo-2024-004 Xibo CMS SQL Injection
Acknowledgements
The vulnerability was discovered by Sergey Bobrov (Kaspersky, https://kaspersky.com/)
https://github.com/BlackFan