cve/2021/CVE-2021-45821.md

19 lines
888 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-45821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45821)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
### POC
#### Reference
- https://emaragkos.gr/infosec-adventures/xbtit-3-1-sql-njection/
- https://github.com/btiteam/xbtit-3.1/issues/6
#### Github
No PoCs found on GitHub currently.