mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
22 lines
1.1 KiB
Markdown
22 lines
1.1 KiB
Markdown
### [CVE-2021-36621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36621)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Sourcecodester Online Covid Vaccination Scheduler System 1.0 is vulnerable to SQL Injection. The username parameter is vulnerable to time-based SQL injection. Upon successful dumping the admin password hash, an attacker can decrypt and obtain the plain-text password. Hence, the attacker could authenticate as Administrator.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/164324/Covid-Vaccination-Scheduler-System-1.0-SQL-Injection-Cross-Site-Scripting.html
|
|
- https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821
|
|
- https://www.exploit-db.com/exploits/50109
|
|
|
|
#### Github
|
|
- https://github.com/2lambda123/CVE-mitre
|
|
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
|
|
- https://github.com/nu11secur1ty/CVE-mitre
|
|
|