Enhancement: cves/2021/CVE-2021-36748.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-06-30 10:47:05 -04:00
parent ca309e4f78
commit c21738d15f
1 changed files with 6 additions and 4 deletions

View File

@ -1,15 +1,15 @@
id: CVE-2021-36748
info:
name: PrestaHome Blog for PrestaShop - SQL Injection
name: PrestaHome Blog for PrestaShop <1.7.8 - SQL Injection
author: whoever
severity: high
description: Blog for PrestaShop by PrestaHome < 1.7.8 is vulnerable to a SQL injection (blind) via sb_category parameter.
description: PrestaHome Blog for PrestaShop prior to version 1.7.8 is vulnerable to a SQL injection (blind) via sb_category parameter.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2021-36748
- https://blog.sorcery.ie/posts/ph_simpleblog_sqli/
- https://alysum5.promokit.eu/promokit/documentation/blog/
- https://blog.sorcery.ie
- https://nvd.nist.gov/vuln/detail/CVE-2021-36748
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
@ -36,4 +36,6 @@ requests:
- 'contains(body_1, "prestashop")'
- "contains(tolower(all_headers_2), 'index.php?controller=404')"
- "len(body_2) == 0"
condition: and
condition: and
# Enhanced by mp on 2022/06/30