Enhancement: cves/2021/CVE-2021-24762.yaml by mp
parent
8d050f0296
commit
c55579f5f5
|
@ -1,11 +1,10 @@
|
||||||
id: CVE-2021-24762
|
id: CVE-2021-24762
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Perfect Survey WordPress plugin before 1.5.2 SQLI
|
name: WordPress Perfect Survey<1.5.2 - SQL Injection
|
||||||
author: cckuailong
|
author: cckuailong
|
||||||
severity: critical
|
severity: critical
|
||||||
description: The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated
|
description: Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
|
||||||
users to perform SQL injection.
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/50766
|
- https://www.exploit-db.com/exploits/50766
|
||||||
- https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget
|
- https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget
|
||||||
|
@ -36,3 +35,5 @@ requests:
|
||||||
- type: dsl
|
- type: dsl
|
||||||
dsl:
|
dsl:
|
||||||
- 'duration>=4'
|
- 'duration>=4'
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/05/16
|
||||||
|
|
Loading…
Reference in New Issue