A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
References
Link | Resource |
---|---|
https://emaragkos.gr/infosec-adventures/xbtit-3-1-sql-njection/ | Exploit Third Party Advisory |
https://github.com/btiteam/xbtit-3.1/blob/master/ajaxchat/getHistoryChatData.php | Exploit Third Party Advisory |
https://github.com/btiteam/xbtit-3.1/issues/6 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-16T15:01:28
Updated: 2022-03-16T15:01:28
Reserved: 2021-12-27T00:00:00
Link: CVE-2021-45821
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-16T15:15:16.020
Modified: 2022-03-28T13:17:57.403
Link: CVE-2021-45821
JSON object: View
Redhat Information
No data.
CWE