CSE Bookstore 1.0 - SQL Injection
ID: CVE-2020-36112
Severity: critical
Author: geeknik
Tags: cve,cve2020,sqli,cse,edb,tenable,cse_bookstore_project
Description
Section titled “Description”CSE Bookstore version 1.0 is vulnerable to time-based blind, boolean-based blind and OR error-based SQL injection in pubid parameter in bookPerPub.php. A successful exploitation of this vulnerability will lead to an attacker dumping the entire database.
YAML Source
Section titled “YAML Source”id: CVE-2020-36112
info: name: CSE Bookstore 1.0 - SQL Injection author: geeknik severity: critical description: CSE Bookstore version 1.0 is vulnerable to time-based blind, boolean-based blind and OR error-based SQL injection in pubid parameter in bookPerPub.php. A successful exploitation of this vulnerability will lead to an attacker dumping the entire database. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/49314 - https://www.tenable.com/cve/CVE-2020-36112 - https://nvd.nist.gov/vuln/detail/CVE-2020-36112 - https://github.com/StarCrossPortal/scalpel - https://github.com/anonymous364872/Rapier_Tool classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-36112 cwe-id: CWE-89 epss-score: 0.40486 epss-percentile: 0.97275 cpe: cpe:2.3:a:cse_bookstore_project:cse_bookstore:1.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cse_bookstore_project product: cse_bookstore tags: cve,cve2020,sqli,cse,edb,tenable,cse_bookstore_project
http: - raw: - | GET /ebook/bookPerPub.php?pubid=4' HTTP/1.1 Host: {{Hostname}}
matchers: - type: word part: body words: - "get book price failed! You have an error in your SQL syntax" - "Can't retrieve data You have an error in your SQL syntax" condition: or# digest: 490a004630440220766d3e6172280ffdf4b7abb13328387cc4e307dcc824e3f47ec44a236aff39f402202c3f01e14443afd34e5a4e59fb6370dd57f9d71197d4cbdff89736aba73a6c7c:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-36112.yaml"