Update CVE-2024-8484.yaml

patch-12
Ritik Chaddha 2024-09-26 11:25:00 +04:00 committed by GitHub
parent 3b81cd8b6e
commit 8a93ae4056
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 4 additions and 4 deletions

View File

@ -7,11 +7,11 @@ info:
description: |
The REST API TO MiniProgram plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the /wp-json/watch-life-net/v1/comment/getcomments REST API endpoint in all versions up to, and including, 4.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-8484
- https://github.com/RandomRobbieBF/CVE-2024-8484
- https://www.usom.gov.tr/bildirim/tr-24-1528
- https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-comments-controller.php#L247
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0945eb-ceec-4536-822a-fe864c21b580?source=cve
- https://nvd.nist.gov/vuln/detail/CVE-2024-8484
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
@ -26,20 +26,20 @@ info:
product: rest-api-to-miniprogram
framework: wordpress
publicwww-query: "/wp-content/plugins/rest-api-to-miniprogram"
tags: cve,cve2024,wordpress,sqli
tags: cve,cve2024,wp,wp-plugin,wordpress,sqli,miniprogram
flow: http(1) && http(2)
http:
- raw:
- |
GET /wp-content/plugins/rest-api-to-miniprogram/readme.txt HTTP/1.1
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body, "REST API TO MiniProgram")'
- 'contains(body, "/wp-content/plugins/rest-api-to-miniprogram")'
- 'status_code == 200'
condition: and
internal: true