diff --git a/cves/2021/CVE-2021-24762.yaml b/cves/2021/CVE-2021-24762.yaml index 4aff726f96..7575822a24 100644 --- a/cves/2021/CVE-2021-24762.yaml +++ b/cves/2021/CVE-2021-24762.yaml @@ -1,11 +1,10 @@ id: CVE-2021-24762 info: - name: Perfect Survey WordPress plugin before 1.5.2 SQLI + name: WordPress Perfect Survey<1.5.2 - SQL Injection author: cckuailong severity: critical - description: The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated - users to perform SQL injection. + description: Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection. reference: - https://www.exploit-db.com/exploits/50766 - https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget @@ -36,3 +35,5 @@ requests: - type: dsl dsl: - 'duration>=4' + +# Enhanced by mp on 2022/05/16