The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-21T11:50:25
Updated: 2024-08-04T04:39:20.520Z
Reserved: 2021-12-20T00:00:00
Link: CVE-2021-45255
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-12-21T12:15:07.567
Modified: 2024-11-21T06:32:01.767
Link: CVE-2021-45255
Redhat
No data.