Enhancement: cves/2021/CVE-2021-25899.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-02-22 14:10:17 -05:00
parent a15a11ebd2
commit f9647c5732
1 changed files with 3 additions and 1 deletions

View File

@ -5,7 +5,7 @@ info:
author: edoardottt author: edoardottt
severity: high severity: high
description: | description: |
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1. Void Aural Rec Monitor 9.0.0.1 contains a SQL injection vulnerability in svc-login.php. An attacker can send a crafted HTTP request to perform a blind time-based SQL injection via the param1 parameter and thus possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
reference: reference:
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/ - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/all-your-databases-belong-to-me-a-blind-sqli-case-study/
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28765
@ -36,3 +36,5 @@ requests:
- 'contains(content_type, "text/html")' - 'contains(content_type, "text/html")'
- 'contains(body, "Contacte con el administrador")' - 'contains(body, "Contacte con el administrador")'
condition: and condition: and
# Enhanced by md on 2023/02/22