The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CSMS-1.0 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-21T11:23:30
Updated: 2021-12-21T11:23:30
Reserved: 2021-12-20T00:00:00
Link: CVE-2021-45253
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-21T12:15:07.527
Modified: 2021-12-27T17:42:05.993
Link: CVE-2021-45253
JSON object: View
Redhat Information
No data.
CWE