From bb5589060b1712167ae4621d8bf2e7adfbdcc467 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+bauthard@users.noreply.github.com> Date: Thu, 18 Feb 2021 10:43:09 +0530 Subject: [PATCH] updating few details --- cves/2021/CVE-2021-3110.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-3110.yaml b/cves/2021/CVE-2021-3110.yaml index 5f693d7800..a094975361 100644 --- a/cves/2021/CVE-2021-3110.yaml +++ b/cves/2021/CVE-2021-3110.yaml @@ -1,12 +1,13 @@ -id: cve-2021-3110 +id: CVE-2021-3110 info: name: prestshop CMS SQL Injection author: Jaimin Gondaliya - severity: high + severity: critical description: Prestashop 1.7.7.0 - 'id_product' Time Based Blind SQL Injection + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-3110 + tags: cve,cve2021,sqli,prestshop - requests: - method: GET path: @@ -19,6 +20,7 @@ requests: - "1 AND (SELECT 3875 FROM (SELECT(SLEEP(5)))xoOt)" condition: and part: body + - type: status status: - 200 \ No newline at end of file