The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Video-Sharing-Website | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-21T11:50:25
Updated: 2021-12-21T11:50:25
Reserved: 2021-12-20T00:00:00
Link: CVE-2021-45255
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-21T12:15:07.567
Modified: 2022-01-04T19:33:36.670
Link: CVE-2021-45255
JSON object: View
Redhat Information
No data.
CWE