The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Video-Sharing-Website | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-12-21 12:15
Updated : 2022-01-04 19:33
NVD link : CVE-2021-45255
Mitre link : CVE-2021-45255
CVE.ORG link : CVE-2021-45255
JSON object : View
Products Affected
video_sharing_website_project
- video_sharing_website
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')