From 74eff31e1d7002aa1ca16dc7047d81dfd1a0f1e1 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 12 Sep 2023 12:50:58 +0530 Subject: [PATCH] info update --- http/cves/2023/CVE-2023-37629.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/http/cves/2023/CVE-2023-37629.yaml b/http/cves/2023/CVE-2023-37629.yaml index ad404c7579..12945abb69 100644 --- a/http/cves/2023/CVE-2023-37629.yaml +++ b/http/cves/2023/CVE-2023-37629.yaml @@ -1,6 +1,7 @@ id: CVE-2023-37629 + info: - name: Online Piggery Management System v1.0 - unauthenticated file upload + name: Online Piggery Management System v1.0 - Unauthenticated File Upload author: Harsh severity: critical description: | @@ -15,7 +16,7 @@ info: cwe-id: CWE-434 metadata: verified: true - tags: fileupload,unauthenticated,exploitdb + tags: cve,cve2023,fileupload,rce,opms http: - raw: @@ -23,6 +24,7 @@ http: POST /pig/add-pig.php HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=---------------------------WebKitFormBoundary20kgW2hEKYaeF5iP + -----------------------------WebKitFormBoundary20kgW2hEKYaeF5iP Content-Disposition: form-data; name="pigno"