Update CVE-2021-24762.yaml
parent
87556aecb4
commit
43cbd4f1e9
|
@ -4,7 +4,8 @@ info:
|
|||
name: WordPress Perfect Survey<1.5.2 - SQL Injection
|
||||
author: cckuailong
|
||||
severity: critical
|
||||
description: Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
|
||||
description: |
|
||||
Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/50766
|
||||
- https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget
|
||||
|
@ -23,17 +24,16 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 404
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'duration>=4'
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "wp-ps-session"
|
||||
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'duration>=4'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 404
|
||||
# Enhanced by mp on 2022/05/16
|
||||
|
|
Loading…
Reference in New Issue