Enhancement: cves/2021/CVE-2021-25899.yaml by md
parent
a15a11ebd2
commit
f9647c5732
|
@ -5,7 +5,7 @@ info:
|
||||||
author: edoardottt
|
author: edoardottt
|
||||||
severity: high
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
|
Void Aural Rec Monitor 9.0.0.1 contains a SQL injection vulnerability in svc-login.php. An attacker can send a crafted HTTP request to perform a blind time-based SQL injection via the param1 parameter and thus possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
|
||||||
reference:
|
reference:
|
||||||
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/
|
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/
|
||||||
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765
|
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765
|
||||||
|
@ -36,3 +36,5 @@ requests:
|
||||||
- 'contains(content_type, "text/html")'
|
- 'contains(content_type, "text/html")'
|
||||||
- 'contains(body, "Contacte con el administrador")'
|
- 'contains(body, "Contacte con el administrador")'
|
||||||
condition: and
|
condition: and
|
||||||
|
|
||||||
|
# Enhanced by md on 2023/02/22
|
||||||
|
|
Loading…
Reference in New Issue