Vulnerability Description
The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Video Sharing Website Project | Video Sharing Website | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/VidExploitThird Party Advisory
- https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/VidExploitThird Party Advisory
FAQ
What is CVE-2021-45255?
CVE-2021-45255 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC fil...
How severe is CVE-2021-45255?
CVE-2021-45255 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-45255?
Check the references section above for vendor advisories and patch information. Affected products include: Video Sharing Website Project Video Sharing Website.