Enhancement: cves/2021/CVE-2021-36748.yaml by mp
parent
ca309e4f78
commit
c21738d15f
|
@ -1,15 +1,15 @@
|
|||
id: CVE-2021-36748
|
||||
|
||||
info:
|
||||
name: PrestaHome Blog for PrestaShop - SQL Injection
|
||||
name: PrestaHome Blog for PrestaShop <1.7.8 - SQL Injection
|
||||
author: whoever
|
||||
severity: high
|
||||
description: Blog for PrestaShop by PrestaHome < 1.7.8 is vulnerable to a SQL injection (blind) via sb_category parameter.
|
||||
description: PrestaHome Blog for PrestaShop prior to version 1.7.8 is vulnerable to a SQL injection (blind) via sb_category parameter.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-36748
|
||||
- https://blog.sorcery.ie/posts/ph_simpleblog_sqli/
|
||||
- https://alysum5.promokit.eu/promokit/documentation/blog/
|
||||
- https://blog.sorcery.ie
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-36748
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
|
@ -36,4 +36,6 @@ requests:
|
|||
- 'contains(body_1, "prestashop")'
|
||||
- "contains(tolower(all_headers_2), 'index.php?controller=404')"
|
||||
- "len(body_2) == 0"
|
||||
condition: and
|
||||
condition: and
|
||||
|
||||
# Enhanced by mp on 2022/06/30
|
||||
|
|
Loading…
Reference in New Issue