Files
CVEs-PoC/2021/CVE-2021-36621.md
2025-09-29 21:09:30 +02:00

22 lines
1.1 KiB
Markdown

### [CVE-2021-36621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36621)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Sourcecodester Online Covid Vaccination Scheduler System 1.0 is vulnerable to SQL Injection. The username parameter is vulnerable to time-based SQL injection. Upon successful dumping the admin password hash, an attacker can decrypt and obtain the plain-text password. Hence, the attacker could authenticate as Administrator.
### POC
#### Reference
- http://packetstormsecurity.com/files/164324/Covid-Vaccination-Scheduler-System-1.0-SQL-Injection-Cross-Site-Scripting.html
- https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-18-09-2821
- https://www.exploit-db.com/exploits/50109
#### Github
- https://github.com/2lambda123/CVE-mitre
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre