Description
The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
Published: 2021-12-21
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-32035 The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
History

No history.

Subscriptions

Video Sharing Website Project Video Sharing Website
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T04:39:20.520Z

Reserved: 2021-12-20T00:00:00.000Z

Link: CVE-2021-45255

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-21T12:15:07.567

Modified: 2024-11-21T06:32:01.767

Link: CVE-2021-45255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses