Auto Generated CVE annotations [Fri Oct 8 13:40:21 UTC 2021] 🤖

patch-1
GitHub Action 2021-10-08 13:40:21 +00:00
parent 1d75fef3b6
commit 87c57ed4ac
4 changed files with 23 additions and 3 deletions

View File

@ -3,12 +3,17 @@ id: CVE-2021-40960
info:
name: Galera WebTemplate 1.0 Directory Traversal
author: daffainfo
severity: high
severity: critical
description: Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow.
reference:
- http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960
tags: cve,cve2021,lfi
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80
cve-id: CVE-2021-40960
cwe-id: CWE-22
requests:
- method: GET

View File

@ -7,6 +7,11 @@ info:
description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
reference: https://github.com/MobiusBinary/CVE-2021-41648
tags: cve,cve2021,sqli
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50
cve-id: CVE-2021-41648
cwe-id: CWE-89
requests:
- method: POST

View File

@ -3,10 +3,15 @@ id: CVE-2021-41649
info:
name: PuneethReddyHC online-shopping-system-advanced SQL Injection homeaction.php
author: daffainfo
severity: high
severity: critical
description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
reference: https://github.com/MobiusBinary/CVE-2021-41649
tags: cve,cve2021,sqli
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80
cve-id: CVE-2021-41649
cwe-id: CWE-89
requests:
- method: POST

View File

@ -3,13 +3,18 @@ id: CVE-2021-41826
info:
name: PlaceOS 1.2109.1 - Open Redirection
author: geeknik
severity: low
severity: medium
description: PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect
reference:
- https://github.com/PlaceOS/auth/issues/36
- https://www.exploit-db.com/exploits/50359
- https://nvd.nist.gov/vuln/detail/CVE-2021-41826
tags: cve,cve2021,placeos,redirect
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10
cve-id: CVE-2021-41826
cwe-id: CWE-601
requests:
- method: GET