Goby/json/74CMS-Resume.php-Boolean-SQ...

41 lines
1.0 KiB
JSON

{
"Name": "74CMS Resume.php Boolean SQLI",
"Description": "74CMS <= v2.2.0 has SQL injection vulnerability. Attackers can use the vulnerability to obtain sensitive information",
"Product": "74CMS",
"Homepage": "http://www.74cms.com/",
"DisclosureDate": "2021-06-05",
"Author": "834714370@qq.com",
"GobyQuery": "app=\"74CMS\"",
"Level": "3",
"Impact": "<p>74CMS &lt;= v2.2.0 has SQL injection vulnerability. Attackers can use the vulnerability to obtain sensitive information<br></p>",
"Recommandation": "",
"References": [
"http://www.74cms.com/downloadse/load/id/33.html"
],
"HasExp": true,
"ExpParams": [
{
"name": "Target",
"type": "input",
"value": "select database()"
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": null,
"ExploitSteps": null,
"Tags": [
"SQL Injection"
],
"CVEIDs": null,
"CVSSScore": "0.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}