The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CSMS-1.0 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-12-21 12:15
Updated : 2021-12-27 17:42
NVD link : CVE-2021-45253
Mitre link : CVE-2021-45253
CVE.ORG link : CVE-2021-45253
JSON object : View
Products Affected
simple_cold_storage_management_system_project
- simple_cold_storage_managment_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')