From c21738d15f12c90297eb1759c920c7038b20176e Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 30 Jun 2022 10:47:05 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-36748.yaml by mp --- cves/2021/CVE-2021-36748.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-36748.yaml b/cves/2021/CVE-2021-36748.yaml index 86b47439c7..de98c52567 100644 --- a/cves/2021/CVE-2021-36748.yaml +++ b/cves/2021/CVE-2021-36748.yaml @@ -1,15 +1,15 @@ id: CVE-2021-36748 info: - name: PrestaHome Blog for PrestaShop - SQL Injection + name: PrestaHome Blog for PrestaShop <1.7.8 - SQL Injection author: whoever severity: high - description: Blog for PrestaShop by PrestaHome < 1.7.8 is vulnerable to a SQL injection (blind) via sb_category parameter. + description: PrestaHome Blog for PrestaShop prior to version 1.7.8 is vulnerable to a SQL injection (blind) via sb_category parameter. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-36748 - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ - https://alysum5.promokit.eu/promokit/documentation/blog/ - https://blog.sorcery.ie + - https://nvd.nist.gov/vuln/detail/CVE-2021-36748 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 @@ -36,4 +36,6 @@ requests: - 'contains(body_1, "prestashop")' - "contains(tolower(all_headers_2), 'index.php?controller=404')" - "len(body_2) == 0" - condition: and \ No newline at end of file + condition: and + +# Enhanced by mp on 2022/06/30