Enhancement: cves/2021/CVE-2021-24762.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-05-16 15:23:40 -04:00
parent 8d050f0296
commit c55579f5f5
1 changed files with 4 additions and 3 deletions

View File

@ -1,11 +1,10 @@
id: CVE-2021-24762 id: CVE-2021-24762
info: info:
name: Perfect Survey WordPress plugin before 1.5.2 SQLI name: WordPress Perfect Survey<1.5.2 - SQL Injection
author: cckuailong author: cckuailong
severity: critical severity: critical
description: The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated description: Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
users to perform SQL injection.
reference: reference:
- https://www.exploit-db.com/exploits/50766 - https://www.exploit-db.com/exploits/50766
- https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget - https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget
@ -36,3 +35,5 @@ requests:
- type: dsl - type: dsl
dsl: dsl:
- 'duration>=4' - 'duration>=4'
# Enhanced by mp on 2022/05/16