Update CVE-2021-24762.yaml

patch-1
Prince Chaddha 2022-05-17 12:14:15 +05:30 committed by GitHub
parent 87556aecb4
commit 43cbd4f1e9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 8 additions and 8 deletions

View File

@ -4,7 +4,8 @@ info:
name: WordPress Perfect Survey<1.5.2 - SQL Injection
author: cckuailong
severity: critical
description: Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
description: |
Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
reference:
- https://www.exploit-db.com/exploits/50766
- https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget
@ -23,17 +24,16 @@ requests:
matchers-condition: and
matchers:
- type: status
status:
- 404
- type: dsl
dsl:
- 'duration>=4'
- type: word
part: header
words:
- "wp-ps-session"
- type: dsl
dsl:
- 'duration>=4'
- type: status
status:
- 404
# Enhanced by mp on 2022/05/16