> [Suggested description] > SQL injection vulnerability in files.php in the "files" component in > ASANHAMAYESH CMS 3.4.6 allows a remote attacker to execute arbitrary SQL > commands via the "id" parameter. > > ------------------------------------------ > > [Additional Information] > This CMS specialty designed for managing the conferences. most of > scientific conferences in IRAN use this CMS to manage the users to > submit articles and also a voting platform for reviewers to select the > best articles. Based on my report a remote attacker can gain access > databases and all users, reviewers and articles private information > will be disclose. > > ------------------------------------------ > > [Vulnerability Type] > SQL Injection > > ------------------------------------------ > > [Vendor of Product] > asanhamayesh.com > > ------------------------------------------ > > [Affected Product Code Base] > CMS - 3.4.6 > > ------------------------------------------ > > [Affected Component] > Databases, all users information, reviewers personal information, private articles. > > ------------------------------------------ > > [Attack Type] > Remote > > ------------------------------------------ > > [Impact Escalation of Privileges] > true > > ------------------------------------------ > > [Impact Information Disclosure] > true > > ------------------------------------------ > > [Attack Vectors] > An attacker as a normal user would use a simple SQL injection. > > ------------------------------------------ > > [Reference] > http://itjdconf.ir/fa/files.php?id=2 > > ------------------------------------------ > > [Discoverer] > Ali Abdollahi