The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.

Subscriptions

Vendors Products
Video Sharing Website Project Subscribe
Video Sharing Website Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-32035 The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T04:39:20.520Z

Reserved: 2021-12-20T00:00:00.000Z

Link: CVE-2021-45255

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-21T12:15:07.567

Modified: 2024-11-21T06:32:01.767

Link: CVE-2021-45255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses