A blind SQL injection vulnerability exists in Xbtit 3.1 via the sid parameter in ajaxchat/getHistoryChatData.php file that is accessible by a registered user. As a result, a malicious user can extract sensitive data such as usernames and passwords and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
References
Link | Resource |
---|---|
https://github.com/btiteam/xbtit-3.1/blob/master/ajaxchat/getHistoryChatData.php | Exploit Third Party Advisory |
https://emaragkos.gr/infosec-adventures/xbtit-3-1-sql-njection/ | Exploit Third Party Advisory |
https://github.com/btiteam/xbtit-3.1/issues/6 | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-03-16 08:15
Updated : 2022-03-28 06:17
NVD link : CVE-2021-45821
Mitre link : CVE-2021-45821
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
btiteam
- xbtit